U.S. Geological Survey: Twitter Earthquake Detector (TED)

03 Environmental Degradation, 10 Security, Citizen-Centered, Civil Society, Collective Intelligence, Earth Intelligence, Geospatial, Geospatial, Government, Graphics, Media

People can receive earthquake data from the @USGSTED Twitter account. The site sends maps of earthquake zones to account holders.

U.S. Geological Survey: Twitter Earthquake Detector (TED)

Sample map output from the Twitter Earthquake Detector prototype  project.

The U.S. Geological Survey is using funds from the American Recovery and Reinvestment Act to support a student who’s investigating social Internet technologies as a way to quickly gather information about recent earthquakes.

In this exploratory effort, the USGS is developing a system that gathers real-time, earthquake-related messages from the social networking site Twitter and applies place, time, and key word filtering to gather geo-located accounts of shaking. This approach provides rapid first-impression narratives and, potentially, photos from people at the hazard’s location. The potential for earthquake detection in populated but sparsely seismicly-instrumented regions is also being investigated.

Social Internet technologies are providing the general public with anecdotal earthquake hazard information before scientific information has been published from authoritative sources.  People local to an event are able to publish information via these technologies within seconds of their occurrence. In contrast, depending on the location of the earthquake, scientific alerts can take between 2 to 20 minutes. By adopting and embracing these new technologies, the USGS potentially can augment its earthquake response products and the delivery of hazard information.

Worth a Look: Onion 9-11 Video, TED Wiki-Leaks

07 Other Atrocities, 10 Security, 11 Society, Government, Law Enforcement, Media, Military, Worth A Look
Michael Ostrolenk Recommends

From the Onion, dated (2009) but achieving new momentum as Americans question their government more and more.

Click to View

.

.

.

.

.

From TED Global 2010, a candid discussion with the founder of WikiLeaks who was also scheduled as a keynote speaker at Hackers on Planet Earth (HOPE) 2010 but was replaced by his colleague due to “possible conflict.”

About this talk

The controversial website WikiLeaks collects and posts highly classified documents and video. Founder Julian Assange, who's reportedly being sought for questioning by US authorities, talks to TED's Chris Anderson about how the site operates, what it has accomplished — and what drives him. The interview includes graphic footage of a recent US airstrike in Baghdad.

About Julian Assange

Internet activist Julian Assange serves as spokesperson for WikiLeaks, a controversial, volunteer-driven website that publishes and comments on leaked documents alleging government and… Full bio and more links

View the Video

Why the world needs WikiLeaks: Julian Assange on TED.com

New Declassified Records Showing the Path Down the Vietnam Road of Doubt and Deception

04 Inter-State Conflict, Government, Media, Military, Misinformation & Propaganda, Open Government, Secrecy & Politics of Secrecy

Records Show Doubts on ’64 Vietnam Crisis
By ELISABETH BUMILLER
Published: July 14, 2010

WASHINGTON — In an echo of the debates over the discredited intelligence that helped make the case for the war in Iraq, the Senate Foreign Relations Committee on Wednesday released more than 1,100 pages of previously classified Vietnam-era transcripts that show senators of the time sharply questioning whether they had been deceived by the White House and the Pentagon over the 1964 Gulf of Tonkin incident.
Full article here

(clips from the article)
“If this country has been misled, if this committee, this Congress, has been misled by pretext into a war in which thousands of young men have died, and many more thousands have been crippled for life, and out of which their country has lost prestige, moral position in the world, the consequences are very great,” Senator Albert Gore Sr. of Tennessee, the father of the future vice president, said in March 1968 in a closed session of the Foreign Relations Committee.

“In a democracy you cannot expect the people, whose sons are being killed and who will be killed, to exercise their judgment if the truth is concealed from them,” Senator Frank Church, Democrat of Idaho, said in an executive session in February 1968.

Robert J. Hanyok, a National Security Agency historian, said Wednesday in an interview that “there were doubts, but nobody wanted to follow up on the doubts,” perhaps because “they felt they’d gone too far down the road.”

Mr. Hanyok concluded in 2001 that N.S.A. officers had deliberately falsified intercepted communications in the incident to make it look like the attack on Aug. 4, 1964, had occurred, although he said they acted not out of political motives but to cover up earlier errors.

Journal: NYT to Robert Young Pelton–Sorry, Our Bad

08 Wild Cards, 10 Security, 11 Society, Cultural Intelligence, Media, Military, Peace Intelligence

Setting the record straight on ‘contractor' spies

The Washington Post Spy Talk    Jeff Stein

Robert Young Pelton spent years investigating counterterrorism mercenaries, so the last thing he expected was to be branded one himself.

Yet there he was on the front page of the New York Times on March 14, his color picture flanked by photos of legendary ex-CIA official Duane R. Clarridge and Michael D. Furlong, a Pentagon psychological warfare official.

The headline: “Contractors Tied to Effort to Track and Kill Militants.”

Today the Times corrected the story.

FULL STORY ONLINE

Robert Young Pelton's Web "Come Back Alive"

Robert Young Pelton comments:

I am happy to report that the New York Times has done the right thing and corrected their depiction of me in their recent series of articles about Afghanistan and “rogue” contractors.  Although I have no personal or ethical problem with DoD contractors, information operations,  intelligence activity  covert operations or any other programs funded by the Department of Defense to protect our citizens here and overseas. I was not a DoD contractor nor was my company or were my employees  involved in any spying, clandestine or illegal activity.

I do have a problem with the illegal use of contractors for espionage, breaking laws or stepping across clearly identified moral boundaries in the use of journalists. But I did not make these allegations, the source for the current activity (almost half a year after we were told the DoD would not be a subscriber) is a leaked memo and DoD insiders. Not my company.

Continue reading “Journal: NYT to Robert Young Pelton–Sorry, Our Bad”

Event: 30 Jun, 2010 OpenNet Initiative (ONI) Global Summit–Should Cyberspace be Secured as an Open Commons?

Civil Society, Computer/online security, Government, Media, Open Government, Policy
Event page registration

The OpenNet Initiative (ONI) 2010 Global Summit will convene three high-level panels of experts and practitioners on prominent topics related to cyberspace governance, security, and advocacy. The three panels will be organized as informal “talk show” or “Davos” style format: an active moderator, questions and answers from the audience, and high-level exchanges among the panelists and the audience (as opposed to formal presentations and Q&As;).
The panels will be open to the public and recorded for subsequent podcast.
The summit follows directly on the 2010 OpenNet Initiative Workshop held at Mont-Tremblant June 28-29, which will bring together the regional ONI Commonwealth of Independent States (Opennet.Eurasia) and Opennet.Asia networks. Both these networks will be present at the summit on June 30th.

EVENT DETAILS:

The OpenNet Initiative-2010 Global Summit/L'Initiative OpenNet-Sommet
Mondial 2010

Should Cyberspace be Secured as an Open Commons?
Le Cyberspace—faut-il défendre l’universalité de ce bien commun?

Victoria Hall (Old City Hall) 111 Sussex Drive
Ottawa, Ontario
June 30, 2010
9:30 AM – 4:30 PM

Panelists and participants:
Panélistes et les participants:

BBC, Google, United States Department of State, National Endowment of
Democracy, United States Broadcasting Board of Governors,
International Development Research Centre, Department of Foreign
Affairs and International Trade, Canada, Public Safety Canada, Bell
Canada, Sesawe, Psiphon Inc, Opennet.Asia, Opennet.Eurasia, and more….

Moderator:
Modérateur:
Jesse Brown (Search Engine)

4:30 PM – 6:30 PM

Cocktail Reception/Réception avec hors d'œuvres

Secrecy News: FBI FOUND 14 INTEL LEAK SUSPECTS IN PAST 5 YEARS

Ethics, Government, Media

SECRECY NEWS
from the FAS Project on Government Secrecy
Volume 2010, Issue No. 50
June 21, 2010

The Federal Bureau of Investigation identified 14 suspected “leakers” of classified U.S. intelligence information during the past five years, according to newly disclosed statistics (pdf).

Between 2005 and 2009, U.S. intelligence agencies submitted 183 “referrals” to the Department of Justice reporting unauthorized disclosures of classified intelligence.  Based on those referrals or on its own initiative, the FBI opened 26 leak investigations, and the investigations led to the identification of 14 suspects.

“While DOJ and the FBI receive numerous media leak referrals each year, the FBI opens only a limited number of investigations based on these referrals,” the FBI explained in a written response to a question from Senator Sheldon Whitehouse (D-RI).

“In most cases, the information included in the referral is not adequate to initiate an investigation. The most typical information gap is a failure to identify all those with authorized access to the information, which is the necessary starting point for any leak investigation. When this information is sufficient to open an investigation, the FBI has been able to identify suspects in approximately 50% of these cases over the past 5 years.  Even when a suspect is identified, though, prosecution is extremely rare (none of the 14 suspects identified in the past 5 years has been prosecuted),” the FBI said.

The FBI report to Congress predated the indictment of suspected NSA leaker Thomas A. Drake, who was presumably one of the 14 suspects that the FBI identified.  The case of Shamai Leibowitz, the FBI contract linguist who pled guilty to unauthorized disclosures in December 2009, is not reflected in the new report and may be outside the scope of intelligence agency leaks that were the subject of the congressional inquiry.

The FBI recommended that agencies continue to report unauthorized disclosures of classified information to the Department of Justice for possible criminal investigation, but it said they should also consider imposing their own administrative penalties.  “Because indictments in media leak cases are so difficult to obtain, administrative action may be more suitable and may provide a better deterrent to leaks of classified information,” the FBI said.

The previously unreported statistical information on unauthorized disclosures of classified intelligence information was transmitted to Congress on April 8, 2010 and was published this month in the record of a September 16, 2009 Senate Judiciary Committee hearing (pdf).

“As a matter of national security and employment discipline, it is important that leakers face repercussions for improper disclosure of classified information,” Sen. Whitehouse said.  This formulation notably implies that a leaker should be subject to punishment even if no damage to national security results from the unauthorized disclosure, so as to bolster an agency's authority over its employees.

The Obama Administration has adopted an increasingly hard line toward leaks of classified information with multiple prosecutions pending or underway, as noted recently in Politico (May 25) and the New York Times (June 11).  A recent memorandum from the Director of National Intelligence will “streamline” the processing of leak investigations, Newsweek reported June 11.