North Koreans + Cellphones = Subverting Oppression, Citizen Intelligence, Baring Secrets

Counter-Oppression/Counter-Dictatorship Practices, Government, Mobile

(So cool, so ill) Read the rest of the story fr NY Times

SEOUL, South Korea — North Korea, one of the world’s most impenetrable nations, is facing a new threat: networks of its own citizens feeding information about life there to South Korea and its Western allies.

The networks are the creation of a handful of North Korean defectors and South Korean human rights activists using cellphones to pierce North Korea’s near-total news blackout. To build the networks, recruiters slip into China to woo the few North Koreans allowed to travel there, provide cellphones to smuggle across the border, then post informers’ phoned and texted reports on Web sites.

The work is risky. Recruiters spend months identifying and coaxing potential informants, all the while evading agents from the North and the Chinese police bent on stopping their work. The North Koreans face even greater danger; exposure could lead to imprisonment — or death.

Related:
Mobile_Citizen_Intelligence_Link_Table (examples of on-the-ground to on-the-web)

Open Energy Info (OpenEI) Wiki (Some private, some public)

05 Energy, Collective Intelligence, Government

homepage

The goal of the wiki is to organize the world's energy information.   Parts of it are open for contributions from the general public.

Open Energy Info (OpenEI) is a platform to connect the world’s energy data. It is a linked open data platform bringing together energy information to provide improved analyses, unique visualizations, and real-time access to data. OpenEI follows guidelines set by the White House’s Open Government Initiative , which is focused on transparency, collaboration, and participation. OpenEI strives to provide open access to this energy information, which will spur creativity and drive innovation in the energy sector.

Search: nato knowledge development handbook

08 Wild Cards, 10 Security, Collective Intelligence, Cultural Intelligence, Government, IO Mapping, IO Multinational, IO Sense-Making, Non-Governmental, Threats, Threats/Topical

What an interesting search, thank you.  Here are some links that came up in a broader search that we import to Phi Beta Iota with a tip of the hat to the anonymous searcher.

Cross-Domain Collaboration Takes Center Stage at NATO Network-Enabled Capability (NNEC) Conference (Intelligence and Knowledge Development, March 12, 2010)

IMPLEMENTATION OF NATO EBAO DOCTRINE AND ITS EFFECTS ON OPERATIONAL STAFFS’ STRUCTURE AND FUNCTIONS by Cristophe MIDAN  Strategic Impact (Impact Strategic), issue: 4 / 2009, pages: 3954, on www.ceeol.com.

MCC Northwood Effects Based Approach to the Operational Planning Process, CDR J.L. Geiger, USN    N521 (Bottom line: Knowledge Development is OSINT outside of the IC combined with rotten and thin secret intelligence from Member states).

Model NATO 2009/2010 Handbook

Cody Burke, Freeing knowledge, telling secrets: Open source intelligence and development (Centre for East-West Cultural and Economic Studies, CEWCES Research Papers, Bond University, 2007)

Journal: Pentagon Strategy & Policy Oxymoron Squared?

02 China, 03 India, 04 Inter-State Conflict, 05 Civil War, 06 Russia, 08 Wild Cards, 10 Security, Government, Military
Michèle Flournoy

Phi Beta Iota: We don't make this stuff up.  The Pentagon has no strategy because the U.S. Government has no strategy.  The National Security Council is managed by a General who emphasized getting along with the Chief of Naval Operation, never-mind leaving Marines wounded on the battlefield for lack of Naval Gunfire Support (NFS).

Join us in savoring what passes for a strategist and nominal policy making savant with the below headlines.

Below item is full text to avoid inconvenience.  It is followed by several linked  headlines that make quite clear the shallowness of the Pentagon strategy-policy pool.

Executive Summary: The gentle lady has no idea what the ten high-level threats to humanity are, nor does she care.  She's a place-holder for the disappointed John Hamre, and a token female at the top who goes with the flow.  She has neither any grasp nor any conceptual framework for actually creating grand strategy, harmonizing Whole of Government policies nor even–this really did surprise us–how many failed states there are in the world.

PBS March 27, 2010

Interview With Michele Flournoy, Under Secretary Of Defense For Policy

Charlie Rose (PBS), 1:00 A.M.

CHARLIE ROSE: The United States military is engaged around the world. It is withdrawing combat troops from Iraq as it builds up troops in Afghanistan. It is partnering with Pakistan in an aggressive counterterrorism campaign including drone attacks in the tribal areas. It’s working with the Yemeni government to counter a resurgent al Qaeda there. And U.S. troops are still in Haiti for the humanitarian relief efforts.

But the military has to do more than respond to the conflicts of the day. It must prepare for future wars, adoptive enemies and a shifting security environment.

The person at the Pentagon who spends the most time working on these issues is Michèle Flournoy. She is under secretary of defense for policy and the highest ranking female official in the Defense Department. I am very pleased to have her with me in the night studio at the Newseum in Washington.

Tell me what it is that you do at the Pentagon, how do you define this responsibility?

Continue reading “Journal: Pentagon Strategy & Policy Oxymoron Squared?”

Journal: Legality of US Drones as Killing Machines . . .

08 Wild Cards, 09 Justice, 09 Terrorism, 10 Security, Government, Military

Death by Drone
Berto Jongman Recommends...

U.S. House of Representatives Subcommittee on National Security and Foreign Affairs Subcommittee Hearing:

“Rise of the Drones:

Unmanned Systems and the Future of War”

Tuesday, March 23, 2010, 2:00 pm 2154 Rayburn House Office Building Written Testimony Submitted By Kenneth Anderson March 18, 2010

Journal: Pentagon as VERY Slow Learner….

03 Economy, 04 Education, 10 Security, 11 Society, Government, Military

Time.com    March 18, 2010

To Battle Computer Hackers, The Pentagon Trains Its Own

By Mark Thompson, Washington

“More than 100 foreign intelligence organizations are trying to hack into U.S. systems,” Deputy Defense Secretary William Lynn warned last month. “Some governments already have the capacity to disrupt elements of the U.S. information infrastructure.” So the Pentagon recently modified its regulations to allow military computer experts to be trained in computer hacking, gaining designation as “certified ethical hackers.” They'll join more than 20,000 such good-guy hackers around the world who have earned that recognition since 2003 from the private International Council of E-Commerce Consultants (also known as the EC-Council).

Continue reading “Journal: Pentagon as VERY Slow Learner….”