Venessa Miemis: Self-Assembling Dynamic Networks and Boundary-less Tribalism (Includes Diaspora)

Advanced Cyber/IO, Autonomous Internet, Civil Society, Collective Intelligence, Cultural Intelligence, Ethics, Hacking
Venessa Miemis

2011: Self-Assembling Dynamic Networks And Boundary-less Tribalism

DK Matai, mi2g

Business Insider, 19 January 2011

“Self-assembling dynamic networks” is one phrase we should all memorise to prepare ourselves and to understand 2011. This phrase encapsulates the defining aspect of both the year ahead and the years to come, as we embark on the second decade of the 21st century.

Whether we act as individuals, families, communities, businesses, government departments or organizations, there can be no question that we have to listen, learn and adapt according to the massive paradigm shift created by self-assembling dynamic networks and their by-product: boundary-less tribalism.

. . . . . . . .

All Silos Penetrated

Just like biological systems, self-assembling dynamic networks are increasingly manifest in every aspect of human thought, behaviour and endeavour in the 21st century enabled by mobile telephones and the Internet. It is no longer a question of when or where… societies, governments, businesses and non-governmental-organisations are all being buffeted by the consequences of this rising phenomenon. Geo-politics, foreign policy, domestic governance, tran-national business, financial markets and online platforms are all being subject to the vagaries of self-assembling dynamic networks in countless ways.

. . . . . . .

Key Features

The key features of self-assembling dynamic networks are as follows:

1. Asymmetric power
2. Unintended consequences
3. No central control
4. No intelligent blueprint or formalised design
5. Rapid scaling
6. Unprecedented speed
7. Trans-national synchronicity
8. Total transparency
9. Creation of boundary-less tribalism
10. New order born out of chaos

Read full article….

2014 Peace from Above: Envisioning the Future of UN Air Power

Advanced Cyber/IO, Analysis, Articles & Chapters, Augmented Reality, Autonomous Internet, Briefings & Lectures, Budgets & Funding, Collective Intelligence, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Ethics, Geospatial, History, info-graphics/data-visualization, InfoOps (IO), International Aid, Journalism/Free-Press/Censorship, Key Players, Maps, Methods & Process, microfinancing, Mobile, Non-Governmental, Peace Intelligence, Policies, Policy, Real Time, Reform, Serious Games, Strategy, Technologies, Threats, Tools
Click on Image to Enlarge

Short URL: http://tinyurl.com/UNODIN

Steele in Dorn Peace from Above As Published

Finally published in 2014 (Article) originally presented in 2011 (Briefing).

The chapter more fully integrates the DNI spiral between modern mature intelligence (M4IS2) and modern mature Air Power.

Abstract 3.1

Briefing 3.3 (29 Slides With Notes As Presented 40 KB pptx)

Event: 15-17 June Ontario UN Aerospace Power

See Also:

2012 Robert Steele: Practical Reflections on UN Intelligence + UN RECAP

UN Intelligence @ Phi Beta Iota

Worth a Look: Wings for Peace – First Book on Air Power in UN Operations

Campaign for Liberty: Steele on IC and DoD

Advanced Cyber/IO, Articles & Chapters, Autonomous Internet, Blog Wisdom
Home Page

National Intelligence and National Defense

By Robert David Steele Vivas

Published 06/17/11

Right up front, here is the value proposition: a revolution in national security affairs can immediately deliver three things:

1. Permit the rapid (four years) reduction of the secret intelligence community budget from $80 billion to under $20 billion and permit the rapid (four years) reduction of the active and reserve military budget from over $1 trillion a year (which is how much the US Government borrows every year “in our name”) to under $250 billion a year, with a strict focus on defense against real modern threats instead of fabricated or exaggerated threats;

Continue reading “Campaign for Liberty: Steele on IC and DoD”

Builders of the Next Net

Advanced Cyber/IO, Autonomous Internet
Venessa Miemis
this is the second post in a series to highlight the people and projects coming together at this year’s Contact Conference, Oct 20, 2011 in NYCOne of the big areas we’ll be highlighting at Contact is ‘next net’ technologies – hardware and software tools that bring people internet access and the ability to connect, communicate and share information without the risk of censorship or shut-down.

Below are just a few of the people and projects we’re looking forward to bringing together this October:

***

Whistle-Blowers of 1777 & Congressional Intent

07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Autonomous Internet, Civil Society, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Ethics, Government, IO Impotency, Law Enforcement, Officers Call
Michael Ostrolenk Recommends...

The Whistle-Blowers of 1777

Stephen M. Kohn

New York Times, 12 June 2011

The tension between protecting true national security secrets and ensuring the public’s “right to know” about abuses of authority is not new. Indeed, the nation’s founders faced this very issue.

. . . . . . .

Later that month, without any recorded dissent, Congress enacted America’s first whistle-blower-protection law: “That it is the duty of all persons in the service of the United States, as well as all other inhabitants thereof, to give the earliest information to Congress or any other proper authority of any misconduct, frauds or misdemeanors committed by any officers or persons in the service of these states, which may come to their knowledge.”

. . . . . . .

Nearly two centuries later, the Supreme Court justice William O. Douglas, praising the founders’ commitment to freedom of speech, wrote: “The dominant purpose of the First Amendment was to prohibit the widespread practice of government suppression of embarrassing information.”

Read full article…..

Phi Beta Iota: This is not about Barack Obama–he sold out, get over it.  This is about a two-party tyranny that hides its prostitution to Wall Street behind secrecy–chasing down whistle-blowers benefits both these parties all those they have shaken down for kick-backs.  This is about a system that is inherently corrupt, in which 63 of 65 parties–and all Independents–are shut out, disenfranchised, and cheated.