David Isenberg: The Perils of Privatizing Intelligence

IO Impotency
David Isenberg
David Isenberg

Ever since former Booz Allen Hamilton contractor Edward Snowden started revealing national Security Agency documents earlier this year there has been renewed debate about what is the proper balance between public and private sector roles and participation in the intelligence community.  This is an issue, which, in recent years, has periodically come up, but has not received the same critical scrutiny in the sustained way the role of private military and security contractors operating in Iraq or Afghanistan has.

But with the advantage of hindsight there were warning signs long before Snowden appeared on the scene. For example, consider an article published in a past issue of the Brown Journal of World Affairs (Fall 2011). The author is Armin Krishnan, a visiting assistant professor of security studies at the University of Texas at El Paso and author of the book War as Business.

The first thing to note is that he is not, per se, opposed to privatizing some functions of the intelligence community which, traditionally, have been held to be an “inherently governmental” function and, thus, only to be performed by government workers. He writes, “The outsourcing of intelligence gathering is not necessarily a problem in itself and is certainly nothing new in the United States. The U.S. government has a long history of reliance on contractors and private companies in the field of intelligence.”

That said, he still thinks intelligence outsourcing has gone too far.  Among his reasons:

The trend toward intelligence privatization and outsourcing is a cause for concern for many reasons. First, it breeds corruption and gross inefficiency. Second, it has resulted in massive abuses of civil liberties and human rights. Third, it weakens the quality of intelligence products, as national intelligence becomes dominated by private interests with strong incentives for biased reporting. Fourth, it creates difficulties for the control and oversight of intelligence activities, as it is more difficult for the government to monitor contracted companies and private companies have less obligation to turn over information to congressional oversight bodies. Fifth, in the long term, it will cause a loss of core competencies and expertise to the private sector, especially as it concerns technology.

Read full article.

Berto Jongman: Bits, Bytes, & Stuff

Cultural Intelligence, IO Impotency, Peace Intelligence
Berto Jongman
Berto Jongman

Avaaz Demands National Leaders Acknowledge Fukushima

Cognitive Computing

Hope in Guatemala

Map: Geopolitical Anomalies

Recorded History is Wrong

Syria Special from Adelphi

Threat: Bitcoin as a Virtual Currency (Says DHS)

Threat: Far More Dangerous Twin to Stuxnet

Threat: GWOT (Says Erik Prince of Blackwater)

Threat: The Next Bin Laden

Threat: Toxic Waste

Threat: Water Sustainability

Stephen J. Arnold: NSA Drives Many to Private Search – Phi Beta Iota: Lacking Code Level Integrity, Privacy is Not an Option

07 Other Atrocities, 11 Society, Corruption, Government, IO Deeds of War, IO Impotency, IO Privacy, Military, Officers Call
Stephen E. Arnold
Stephen E. Arnold

Users Seek Private Search Options After NSA Revelations

This is certainly no surprise. CSO reveals, “People Flock to Anonymizing Services After NSA Snooping Reports.” Writer Grant Gross highlights several anonymous search services that have seen usage soar since certain NSA practices have come to light. DuckDuckGo is on the list, as well as Tor and mobile solution Silent Circle. The brand new Disconnect Search saw over 400,000 searches within four days of its launch. Clearly, many people are beginning to cover their virtual tracks. But is it pointless, after all? The article points out:

Disconnect Search’s FAQ includes information about possible government searches. ‘The reality is the U.S. government may force us to begin logging the search queries of a particular user or group of users,’ the FAQ said. ‘If served with a court order that includes a non-disclosure provision, we may not be able to tell our users about this change for some period of time, possibly forever. And the U.S. government may also have other methods of monitoring user searches which Disconnect Search cannot prevent.’”

Though we now know several prominent firms quietly complied with NSA demands to fork over their records, at least one search service has elected to fold rather than cave. Lavabit made the tough choice to shut down their decade-old organization rather than comply with. . . something. Owner Ladar Levison’s explanation, which is all that is left of the site, laments that he can’t tell us exactly what was demanded of him, but his frustration and ire are apparent in the strongly worded note. He writes:

“I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what’s going on–the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise.”

So, there’s that. Not exactly encouraging for fans of privacy. Lavison seems to hold at least a sliver of hope for a favorable verdict as Lavabit takes their fight to court. Is even that too optimistic?

Cynthia Murrell, November 20, 2013

Sponsored by ArnoldIT.com, developer of Augmentext

Marcus Aurelius: Acoustic Hackers Can Halt Fleet

Ineptitude, IO Impotency, IO Technologies, Military
Marcus Aurelius
Marcus Aurelius

US NAVY: Hackers ‘Jumping The Air Gap' Would ‘Disrupt The World Balance Of Power'

Geoffrey Ingersoll

Business Insider, Nov. 19, 2013, 2:54 PM

The next generation hackers may be taking to sound waves, and the Navy is understandably spooked.

Speaking at last week's Defense One conference, retired Capt. Mark Hagerott cited recent reports about sonic computer viruses as one way that hackers could “jump the air gap” and target systems that are not connected to the Internet.

“If you take a cybernetic view of what's happening [in the Navy], right now our approach is unplug it or don't use a thumb drive,” Hagerott said. But if hackers “are able to jump the air gap, we are talking about fleets coming to a stop.” 

For a long time the thought was that an air gap (systems that are not connected to the Internet) rendered networks pretty much impenetrable.

Then the Stuxnet virus happened — an Iranian nuclear scientist with an infected thumb drive walked a virus through the air gap and unknowingly uploaded a destructive virus onto a network controlling nuclear centrifuges. This attack not only damaged Iran's nuclear facilities, but it also signaled the dawn of kinetic cyber attacks (the kind that cause physical damage) and the revealed the vulnerability of air gaps.

It's not just thumb drives though. Hagerott cited reporting by Arstechnica's Dan Goodin on a virus that supposedly transmitted via high-frequency sound waves.

Goodin called the malware “the advanced persistent threat equivalent of a Bigfoot sighting.”

Continue reading “Marcus Aurelius: Acoustic Hackers Can Halt Fleet”

Jean Lievens: NSA Has Destroyed Cyber-Trust

Corruption, Cultural Intelligence, Government, IO Deeds of War, IO Impotency, Military
Jean Lievens
Jean Lievens

Trusted Computing Must Repudiate The NSA – Forbes

Trust is fragile and the decade long effort on the part of the NSA to compromise all security models has destroyed trust. From its inception the coalition of industry giants who have backed the concept of hardware-based security, the Trusted Computing Group (TCG), have been at odds with the “information should be free” crowd. The problem these giants (Microsoft, Intel, AMD, IBM, HP) faced a decade ago was software and media piracy. As the biggest backer, Microsoft, was the most suspect. In recent weeks that suspicion of Microsoft has exploded into bald-face claims from the German BSI that the Trusted Platform Module, the hardware component of Trusted Computing is an NSA backdoor. And who knows what further releases of the Snowden files will unveil about the NSA’s involvement with the Trusted Computing Group?

Read full article.

Continue reading “Jean Lievens: NSA Has Destroyed Cyber-Trust”

Berto Jongman: Bits, Bytes, & Stuff

Cultural Intelligence, IO Impotency
Berto Jongman
Berto Jongman

Analysis of Al Qaeda — loose pack listening for one howl

Phi Beta Iota: This is one of the most interesting Information Operations (IO) relevant pieces we have read recently.

Avaaz Online Activism (The Guardian)

Phi Beta Iota: Now imagine Avaaz joining with Amazon and Crisis Mappers.

Brain Filtering Process

CIA's Domestic Collection Division

Phi Beta Iota: They provide more intelligence at less cost than the clandestine service. They also know almost nothing about holistic analytics or full spectrum human open source intelligence.

Click on Image to Enlarge
Click on Image to Enlarge

Doctor's Protocol Field Manual (Survivalist Literature)

INTERVIEW: Citizen's Tools via Sunlight Foundation

Mafia Targeting Pope?

Phi Beta Iota: Much more likely to target the pope is the mix of banking, pedophiles, and neo-Nazi militarists.

Modern Afghanistan (Cartoon)

 

noble gold