2011 Robert Steele: Global Trends 2030 – Gaps + RECAP

Corruption, Cultural Intelligence, Director of National Intelligence et al (IC), Earth Intelligence, Government, IO Impotency, Methods & Process, Officers Call
Robert David STEELE Vivas

UPDATE 11 December 2012:  The report is now out.  The below commentary was posted 12 December 2011, one year prior to the final report.  Global Trends 2030: Full Copy (166 Pages) Here, Review by Robert Steele — Report Lauds Fracking as Energy Solution, Disappoints on Multiple Fronts

Although Global Trends 2030 will not be released by the US secret intelligence community until after the November 2012 election, minutes of the 22-24 May 2011 meeting are available and provide a useful panorama of what the group is and is not considering.

Original Source (PDF 14 Pages)

Back-Up Source (PDF 14 Pages)

A few observations:

1.  They still do not have  a Strategic Analytic Model, nor do they understand in any systematic manner the preconditions and precipitants of revolution, or the cultural fundamentals.

Click on Image to Enlarge

2.  They are so beholden to status quo science they actually consider the exploitation of shale gas and oil to be a serious positive–lacking a strategic analytic model, it does not occur to them to examine the true cost of such initiatives, e.g. water, environmental degradation, etcetera.  They do not “get” the fragmentation of knowledge as being among the chief obstacles to creating strategic intelligence.

3.  They are oblivious to the “eight tribes* while creeping up on government-business collaboration (and clearly also oblivious to the fact that this is actually plutocracy and corporate capture, not collaboration).

* Academia, Civil Society [inclusive of labor and religion], Commerce, Government [all levels], Law Enforcement, Media, Military, Non-Governmental / Non-Profit.

Continue reading “2011 Robert Steele: Global Trends 2030 – Gaps + RECAP”

Steven Aftergood: CIA Classifies Open Source Works

04 Education, 07 Other Atrocities, Corruption, Cultural Intelligence, Director of National Intelligence et al (IC), Government, Intelligence (government), IO Impotency, Methods & Process, Officers Call
Steven Aftergood

Charter of Open Source Org is Classified, CIA Says

Open Source Works, which is the CIA’s in-house open source analysis component, is devoted to intelligence analysis of unclassified, open source information.  Oddly, however, the directive that established Open Source Works is classified, as is the charter of the organization.  In fact, CIA says the very existence of any such records is a classified fact.

“The CIA can neither confirm nor deny the existence or nonexistence of records responsive to your request,” wrote Susan Viscuso, CIA Information and Privacy Coordinator, in a November 29 response to a Freedom of Information Act request from Jeffrey Richelson of the National Security Archive for the Open Source Works directive and charter.

“The fact of the existence or nonexistence of requested records is currently and properly classified and is intelligence sources and methods information that is protected from disclosure,” Dr. Viscuso wrote.

This is a surprising development since Open Source Works — by definition — does not engage in clandestine collection of intelligence.  Rather, it performs analysis based on unclassified, open source materials.

Thus, according to a November 2010 CIA report, Open Source Works “was charged by the [CIA] Director for Intelligence with drawing on language-trained analysts to mine open-source information for new or alternative insights on intelligence issues. Open Source Works’ products, based only on open source information, do not represent the coordinated views of the Central Intelligence Agency.”

As such, there is no basis for treating Open Source Works as a covert, unacknowledged intelligence organization.  It isn’t one.

Continue reading “Steven Aftergood: CIA Classifies Open Source Works”

Chuck Spinny: Obama Zero Understanding, All Shicksa

02 Diplomacy, 06 Genocide, 07 Other Atrocities, 08 Wild Cards, 10 Security, Corruption, Cultural Intelligence, Government, IO Impotency
Chuck Spinney

Why the President Obama Should Study Sun Tzu

While Obama worries about appeasing Israel and Jewish vote at home, as well as being pressured to support threats of an Israeli attack on Iran, the government of Israel beavers away as usual, creating new facts on the ground.

Here (portions of which are quoted below) is an editorial in Ha'aretz, one of Israel's leading newspapers, describing one way the Israeli government continues to plant seeds for the eventual cleansing of Palestinians from Jerusalem and the West Bank by exploiting the paralysis it created in what is absurdly known as the “peace process.”

Chuck Spinney
The Blaster

Without peace talks, Israel must leave East Jerusalem alone

Discussions on Jerusalem were postponed to a later stage of the final-status negotiations, but it was never agreed that this interlude be exploited to create facts on the ground.

Haaretz Editorial, 7 December 2011

As the diplomatic process has sunk deeper into hibernation, acts whose sole purpose is to tighten Israel's annexation of East Jerusalem have multiplied. Thus even as the Palestinians have given the Quartet a proposal on security arrangements and permanent borders in the West Bank, Israel is advancing proposals to change the master plans of neighborhoods over the Green Line.

Read full article.

Spinny Note: My favorite translations of Sun Tzu's classic are Thomas Cleary's for a political/phlosophical orientation and Samuel B. Griffith's for a military orientation.  Readers interested in a modern application of Sun Tzu's ideas, and especially the art of using Cheng & Ch'i operations to unravel an adversary's decision cycle, will find them embedded throughout Col. John Boyd's seminal study of conflict, A Discourse on Winning and Losing, especially Patterns of Conflict and The Strategic Game.

DefDog: Iran Hijacks US Drone Shows Film + RECAP

05 Iran, Corruption, DoD, InfoOps (IO), IO Impotency, Military, Officers Call, Politics of Science & Science of Politics, Secrecy & Politics of Secrecy, Technologies
DefDog

An outstanding piece of bargaining power for Iran with both Russia and China….don't expect UN sanctions anytime soon…..

Updated 11 Dec 2011 to add more stories with photos and comment.

Iran won't return U.S. drone it claims to have

Iran Shows Video It Says Is of U.S. Drone

Zakaria and Baer: Downed U.S. drone an intel catastrophe

Phi Beta Iota:  Variants of this stuff are for sale at Brookstone and Best Buy. The US has consistently refused to be serious about emission control, downlink security, and real-time processing.  This is a “disaster” only to the degree that it reveals–once again–how immature the US “intelligence” archipelago of fiefdoms actually is.

Iran shows film of captured US drone

BBC, 8 December 2011

Iranian TV has shown the first video footage of an advanced US drone aircraft that Tehran says it downed near the Afghan border.

Images show Iranian military officials inspecting the RQ-170 Sentinel stealth aircraft which appears to be undamaged.

US officials have acknowledged the loss of the unmanned plane, saying it had malfunctioned.

However, Iranian officials say its forces electronically hijacked the drone and steered it to the ground.

Click on Image to Enlarge

BBC security correspondent Frank Gardner says the intact condition of the Sentinel tends to support their claim.

Iran's Press TV said that the Iranian army's “electronic warfare unit” brought down the drone on 4 December as it was flying over the city of Kashmar, about 140 miles (225km) from the Afghan border.

Nato said at the weekend that an unarmed reconnaissance aircraft had been flying a mission over western Afghanistan late last week when its operators lost control of it.

Pentagon officials have said they are concerned about Iran possibly acquiring information about the technology.

Read full article.

Phi Beta Iota: Our first impression has been that Iran has downed the UAV with an Electromagnetic Pulse (EMP) beam.  This is much cooler.  As with the Taliban in Afghanistan able to hijack the downlinks, the Iranians simply hijacked the entire aircraft.  From where we sit, the Chinese (who ride electric power circuits into “isolated” computers) and the Iranians [Persians, more PhDs per capita than most] are laughing at us, while the Russians simply ignore us.  Newsflash for the Pentagon: our technology is not that great.  Classifying the idiot vulnerabilities does not work–something we have been pointing out for twenty years.

Bob Seelert, Chairman of Saatchi & Saatchi Worldwide (New York): When things are not going well, until you get the truth out on the table, no matter how ugly, you are not in a position to deal with it.

See Also:

Dolphin: Their Drones, Our Drones, and EMP Rays

Journal: Insurgents Hack U.S. Drones

Journal: Gorgon Stare (All Eyes, No Brain)

Journal: Running Interference On Interference

Journal: U.S. Air Force–Remote from War & Reality

Penguin: The Heart of Darkness is Empire

01 Poverty, 03 Environmental Degradation, 04 Inter-State Conflict, 07 Other Atrocities, 08 Wild Cards, 09 Justice, 10 Security, 10 Transnational Crime, 11 Society, Book Lists, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Government, IO Impotency, Military, Money, Banks & Concentrated Wealth, Power Behind-the-Scenes/Special Interests, Strategy
Who, Me?

Britain's Empire: Resistance, Repression and Revolt by Richard Gott – review

The violence at the heart of colonialism is exposed in Richard Gott's history

Richard Drayton

Guardian, 7 December 2011

Amazon Page for Reviewer's Book Nature's Government

“We insisted on reserving the right to bomb niggers.” So David Lloyd George explained the British government's demand at the 1932 World Disarmament Conference to keep the right to bomb for “police purposes in outlying places”. Airpower had shown its value in spreading what Winston Churchill, when defending in 1919 the use of poison gas against “uncivilised tribes”, had called “a lively terror”. Richard Gott shows how a hundred years earlier more hands-on means were used to similar ends: the heads of rebel slaves in Demerara in 1823 and Jamaica in 1831 were cut from their bodies and placed on poles beside the roads. The mutilation of the corpses of the defeated never quite goes out of fashion.

Amazon Page

Empires have always depended on violence. Killing, torture and the destruction of property are essential to those tasks of destroying resistance, extracting information and collaboration, and demonstrating dominance that underly all conquest. But it is the privilege of conquerors to tell stories that flatter their own past. It is, thus, rare to find the historians of any imperial power describing the ugly business of the frontier as more than unfortunate exceptions to an otherwise honourable enterprise. Britain is no exception: from the Victorians until the 1950s, its historians mainly saw in the British empire a great engine for diffusing liberty and civilisation to the world. If such Whig piety declined in the era after Suez, later scholars, studying particular places and times, never connected all the episodes of massacres, rebellions and atrocities. Popular historians continued profitably to sell happy stories of the empire to the British public – always marketed as daring revisionist accounts.

Gott's achievement is to show, as no historian has done before, that violence was a central, constant and ubiquitous part of the making and keeping of the British empire.

. . . . . . .

What Gott loses by this focus on resistance, however, is any subtlety in understanding the meanings of collaboration. He repeatedly imposes the lens of 20th-century nationalism, and even anti-fascism, so that those who did not rebel become traitors or “fifth columnists”. He does not examine with care or sympathy the varieties of loyalism, and the motives and experiences of those who chose, however mistakenly, to throw in their lot with the British. Neither does he explore how the economic and technological bases of British power changed between 1750 and 1850. For the revolution that science and industry brought to production, transport, communication and war made Britain able to attract and to extort indigenous collaboration more easily, and changed how the British understood themselves as a nation and their rights in the wider world. The empire was made by more than violence.

Read full review.

See Also:

Worth a Look: Book Reviews on Class War (Global)

Worth a Look: Book Reviews on Corporate & Transnational Crime

Worth a Look: Book Reviews on Empire as Cancer Including Betrayal & Deceit

Mini-Mi: Why is Google Evil? One Blogger’s View

Corruption, IO Impotency
Who? Mini-Me?

Found and then lost again in cyberspace….a blogger responds to the question, “Why is Google evil?”

1) They are actively collaborating with NSA and CIA

2) They are focused on exploiting all information with zero privacy controls

3) They are a variation of the Microsoft error–they focus on hacking digital trash instead of empowering humans to make sense–Microsoft focused on “owning” the desktop while shutting out all third party vendors of sense-making through Application Program Interfaces (API) that served as toll booths.

4) They are not open source. I cannot stress this enough. Entire governments (Norway, China) are understanding this now. If it is not open source, it is not suitable for the public domain.

DefDog: SASC Questions Sanity of Pentagon InfoOps

Corruption, Government, IO Impotency, Military
DefDog

The Pentagon may have hit a speed bump in the expansion of its growing worldwide information operations…………

A speed bump for Pentagon’s information ops

The Pentagon may have hit a speed bump in the expansion of its growing worldwide information operations.

The Senate Armed Services Committee has asked Defense Secretary Leon Panetta to assess the effectiveness of a series of news and information Web sites that have been initiated by U.S. Special Operations Command (SOCOM) in recent years in a bid to counter extremist messaging. The so-called “influence Web sites” are maintained by various overseas commands and operated by defense contractors.

For fiscal 2012, SOCOM sought $22.6 million in the Overseas Contingency Operations account — primarily intended to fund the wars in Afghanistan and Iraq — for the initiative.

Congress, over the past few years, has been pressing the Pentagon to justify the hundreds of millions of dollars spent overseas under various headings such as “strategic communications” and “information operations.”

Read full article.

Phi Beta Iota:  No one now serving in the US Government actually has a clue what Information Operations (IO) should be, because no one now serving in the US Government can combine intelligence and integrity to get to holistic analytics with deep “true cost” data.  IO is all information in all languages all the time.  Secret intelligence is 10% of all-source intelligence and all-source intelligence is 10% of IO.  IO includes policy, acquisition, and operations feed-back loops that must be transparent, truthful, and replete with trust–that pretty much eliminates ALL inter-agency and intra-agency information.  We've learned nothing since 1992.

See Also:

2011 Cyber-Command or IO 21 + IO Roots

2011 from 1999: Setting the Stage for Information-Sharing in the 21 st Century (Full Text Online)

2008: Creating a Smart Nation (Full Text Online for Google Translate)

Paul Fernhout: Open Letter to the Intelligence Advanced Programs Research Agency (IARPA)

Search: Steele USMC C4I 1990′s

noble gold