Overcoming the political divide, but not through facts!

03 Economy, 04 Education, 06 Family, 11 Society, Advanced Cyber/IO, Articles & Chapters, Civil Society, Cultural Intelligence, InfoOps (IO), Methods & Process, Misinformation & Propaganda
John Steiner

This is a great analysis of how the liberal/conservative political divide persists, and a suggested path to solving it. By Ethan Zuckerman at the Berkman Center.

Great quote up front:

“You don’t lead with the facts in order to convince. You lead with the values — so as to give the facts a fighting chance.”

04/25/2011 (11:41 am)

Overcoming political polarization… but not through facts

A recent New York Times poll suggests that Americans are in a dark mood. 70% of people think the country is moving in the wrong direction, a number not seen since the peak of the Great Recession two years ago. Their frustration may stem from higher gas prices or continued unemployment, but at least some commentators believe that a key factor is popular frustration with a dysfunctional government that doesn’t seem able to address the issues the US is facing.

Read entire piece with many links….

Phi Beta Iota: This has been upgraded to a reference.  Brother Steiner has brought forward one of the most elegant reviews of the conflicts between beliefs, values, facts, and needs that we have seen.  This is a deep and broad article whose substance–and the links therein–merit appreciation by all who wish to advance the public's common interest.

Online Identity & Data Ownership Debate Matters!

Advanced Cyber/IO, Cultural Intelligence, Government
Venessa Miemis

Why the Online Identity & Data Ownership Debate Matters

Venessa Miemis | April 28, 2011 at 12:36 pm

emergent by design

There has been quite a bit of media attention the past week around the news that iPhones and iPads are recording and storing location data in an unencrypted manner. Apple replied that it’s not tracking iPhone location, it’s maintaining a database of surrounding Wi-Fi hotspots and cell towers so the iPhone can calculate its location when requested.

Anyway, the little window of raised awareness and interest in data mining and privacy compelled me to want to write a bit about it.

I’ve been exploring many angles over the past few years of how humanity and our technologies are co-evolving, – how social media tools are offering us new ways to collaborate, to see ourselves through different lenses, to intentionally evolve our consciousness, and to explore new forms of value exchange.

I was invited to participate in the Internet Identity Workshop in Silicon Valley next week, and the Privacy Identity Innovation conference later in May, so my new learning objective has been to get a grasp on online identity and personal data ownership.  It’s really quite fascinating, and there is a real sense of urgency for awareness to be raised around what’s happening and what it means.

The Big Picture

What is Revealed: Macro Level

What is Revealed: Micro Level

What’s at Stake

The Future We Deserve

Read full posting…

Internet Design Principles Call for Papers

Advanced Cyber/IO, Autonomous Internet, IO Multinational
Michel Bauwens

Future Internet Reference Architecture Group: Towards architectural design principles and a reference architecture for the Future Internet

Call for Position Papers on Internet Design Principles.

Deadline for papers: 29/04/2011

workshop: 23/05/2011

The main objective of this activity is to define a common set of architectural design principles and a reference architecture of the Future Internet that can guide and unify key technology developments in the future.

The scope is a FI Reference Architecture developed in a holistic way by incorporating design principles and by integrating key viewpoints. It will focus on core functionality of a Future Internet, including protocols, interfaces, invariants, interoperability and generic enablers.

Find here the first report prepared by the FIArchitecture group. It covers the limitations of the current Internet.

Read more….

From the Pentagon? More Education, Fewer Guns?

03 Economy, 04 Education, 10 Security, 11 Society, Advanced Cyber/IO, Analysis, Ethics, InfoOps (IO), Intelligence (government), Military, Officers Call, Peace Intelligence, Strategy, Threats

An excellent read from credible sources in the vein of Phi Beta Iota articulated reforms.  Oh, and by the way, surprisingly this was written (in part, this is a two-author article) by a fellow naval intelligence professional (and more surprising is the fact it comes from a senior navy intelligence officer …. not something I would have expected, given how wed to cold-war ideals most of the senior leadership is…

Now Playing

The Pentagon’s ‘Mr. Y’ And National Security

Direct download: Mp3 (podcast)

The Pentagon’s ‘Mr. Y’ And National Security

Two Special Assistants to Chairman of the Joint Chiefs of Staff Adm. Mike Mullen say (unofficially) it’s time, strategically, to spend more on education and less on guns. We’ll hear them out.

See Also:

Continue reading “From the Pentagon? More Education, Fewer Guns?”

FBI Wages Its Own Cyberwar on Zombie PCs

Advanced Cyber/IO, Civil Society, Law Enforcement
DefDog Recommends....

Potential to be very dangerous, although they are requesting permission and suggest there are problems associated with the removal of the malware, it represents another government intrusion under the guise of protecting the public…….requires serious consideration and oversight, both of which are lacking in government….

FBI May Hunt Down and Destroy Botnets in Zombie PCs

FBI May Hunt Down and Destroy Botnets in Zombie PCs

By Erika Morphy

TechNewsWorld

04/27/11 3:26 PM PT

The FBI isn't satisfied with having beheaded the Coreflood botnet. Now it wants to go after all the zombie PCs hosting the malware, uninstall it, and thus prevent the monster from springing back to life. Individuals would be notified and their authorization secured before any action would be taken, a complicated and daunting process. Security experts are hailing the ambitious government plan as nothing short of amazing.

Read rest of story….

Phi Beta Iota: Evidently the FBI a) has done some very decent work in this area; b) Cyber-Command is not defending the USA against this threat that originates in China and Russia among other places; and c) there is still no emphasis on creating hardware and software with integrity such as Apple creates–this is a Microsoft “shitty software” problem, and the taxpayer is paying for it.

See Also:

2010: OPINION–America’s Cyber Scam

1994 Sounding the Alarm on Cyber-Security

An API for Sharing & MindMap for Next Net

Advanced Cyber/IO, Citizen-Centered, ICT-IT, Innovation
Venessa Miemis

here's a use case for interoperability ;)

Three years ago, when our team at Kassi began sketching our idea of an online service for sharing goods and skills, we were not aware that others were doing the same thing. Since then, we have found that the idea is definitely not new. This catalogue alone lists more than a hundred services that allow people to lend, borrow, swap and recycle goods, and it probably includes only a fraction of them all.

Read more….

it's easier for me to visualize all these moving parts on a mindmap
than on a wiki.

i started to plot out a couple areas, but if anyone wants to help flesh it out, let me know.

Click on Image to Enlarge

Source

Simultaneous Policy: Two Interviews

Advanced Cyber/IO, Analysis, Augmented Reality, Collective Intelligence, Collective Intelligence, Communities of Practice, Earth Intelligence, InfoOps (IO), Key Players, Methods & Process, Open Government, Policies, Real Time, Reform, Serious Games, Strategy, Threats, Tools

1. Simpol – John Bunzl – Interview Part One (April 15, 2009)

 

Click on Image to View
See Simpol's Founder, John Bunzl, explain Simpol on Youtube, Part 1.   (about 5 minutes)

2. Simpol – John Bunzl – Interview Part Two (April 15, 2009)

 

Click on Image to View
See Simpol's Founder, John Bunzl, explain Simpol on Youtube, Part 2.   (about 5 minutes)
noble gold