Steven Aftergood: Obama Ambivalent on Open Government

11 Society, Advanced Cyber/IO, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Government, IO Impotency
Steven Aftergood

AN AMBIVALENT WHITE HOUSE REPORT ON OPEN GOVERNMENT

The White House reiterated its support for open government in a new report issued Friday afternoon.  But curiously, the 33-page document on “The Obama Administration's Commitment to Open Government” (pdf) downplays or overlooks many of the Administration's principal achievements  in reducing inappropriate secrecy.  At the same time, it fails to acknowledge the major defects of the openness program to date.  And so it presents a muddled picture of the state of open government, while providing a poor guide to future policy.

“At the President's direction, federal agencies have promoted greater transparency, participation, and collaboration through a number of major initiatives,” the new report says. “The results of those efforts are measurable, and they are substantial. Agencies have disclosed more information in response to FOIA requests; developed and begun to implement comprehensive Open Government plans; made thousands of government data sets publically available; promoted partnerships and leveraged private innovation to improve citizens' lives; increased federal spending transparency; and declassified information and limited the proliferation of classified information.”

Most of that is true, in varying degrees.  (However, there is no evidence that the proliferation of classified information has in fact been limited; the opposite is the case.)

Continue reading “Steven Aftergood: Obama Ambivalent on Open Government”

DefDog: How not to catch a terrorist…

07 Other Atrocities, 09 Justice, 09 Terrorism, Government, IO Impotency, Law Enforcement
DefDog

More government waste–doing the wrong things at great expense.

Op-Ed

How not to catch a terrorist

Elaborate, expensive sting operations by the FBI are based on the premise that true terrorists will take the bait. This is not the same thing as preventing an actual attack.

By Petra BartosiewiczLos Angeles Times, September 18, 2011

Shortly after Sept. 11, 2001, FBI Director Robert Mueller issued a memo to his field offices detailing “one set of priorities” for the agency: Stop the next terrorist attack. This directive marked a new “preemptive” style of law enforcement that has since become the hallmark of our domestic front in the war against terrorism.

Under this system, catching an actual terrorist would constitute a failure because the perpetrators would have committed the act. Instead, we are in effect seeking “pre-terrorists” — individuals whose intentions, more than their actions, constitute the primary threat.

Taking stock of the major “terrorist” prosecutions that this approach has yielded, however, it's not at all clear we're safer from another attack.

Read full article.

Chuck Spinney: How Incestuous Amplification Leads to Treason

Corruption, Cultural Intelligence, IO Deeds of Peace, IO Impotency
Chuck Spinney

9-11: Incestuous Amplification Highjacks the American OODA Loop

Mark Danner has written a brilliant exegesis (also attached below) of how the collective leadership of the United States dragged an entire nation off its moral rails in its reaction to 9-11. It is long but well worth the reading investment.

While Danner does not use the term, he has provided a detailed case study of how the phenomenon of a dysfunctional Orientation folds back on itself to disconnect a decision maker (or any collective of decision makers up to and including a nation) from reality, thereby increasing confusion and disorder, and in so doing, destroying what passes for a moral compass.  A key to understanding how this evolves ineluctably (and correcting it)  from an epistemological perspective is to understand the Colonel Boyd’s theory of the Observation – Orientation – Decision – Action or OODA loop [1] and how the phenomenon of Incestuous Amplification (IA) corrupts the Orientation, which then folds back on itself to disconnect the entire loop from reality.  Once IA is set into motion and is left uncorrected, it always tears any decision cycle to pieces form within. Boyd showed why there are very fundamental epistemological reasons for this unfolding evolution. New readers will find an introduction to incestuous amplification in my essay: Incestuous Amplification and the Madness of King George (Counterpunch, 10 Sep 2008).   In fact, when reading this essay, all one needs to do is substitute Danner’s analysis for Andrew Bacevich’s analysis, take the two-question quiz at the end of the 2008 essay and marvel at the contemporary relevance of the answers.

Caveat: Trying to understand Boyd’s ideas might help guard against IA, but it is by no means a guarantee.  What I find truly horrifying is that the only national leader who made an effort to understand Boyd’s ideas — Richard Cheney when he was a congressman and Secretary of Defense — has just written a self-righteous memoir that proves his decision cycle is still corrupted by an extreme case of incestuous amplification.

Chuck Spinney
From the Sea

EXTRACT

One of the most damaging failures of the early War on Terror was the willingness of the Bush administration to act in a way that seemed to embody the caricature that bin Laden and al-Qaeda had made of the United States: a muscle-bound, arrogant, crusading, hegemonic superpower intent on repressing and abusing and humiliating Muslims. The naked obscenities from Abu Ghraib, the images of shackled, hooded Muslims in their orange jumpsuits at Guantánamo, were immense victories for al-Qaeda in a war whose foremost strategic goal was the recruitment of young Muslims to the cause of extremist, anti-American Islamic fundamentalism. It is this “battle of the story” that Dick Cheney, for example, still fails utterly to grasp. “I don’t have much sympathy for the view that we should find an alternative to Guantánamo…,” he tells us in his memoir, “simply because we are worried about how we are perceived abroad.”

After September 11: Our State of Exception

Mark Danner

New York Review of Books, 13 October 2011

We are in a fight for our principles, and our first responsibility is to live by them.

—George W. Bush, September 20, 2001

Read full analysis.

Phi Beta Iota:  When idiocy and ideology become the coin of the realm, everyone who remains silent is a collaborator in the high crimes and misdemeanors that occur.  This is why the Oath to the Constitution explicitly calls for loyalty to the Constitution, not the chain of command, and for attention to domestic enemies, not just foreign enemies.  We have met the enemy, and he is us.  Everything else is a traffic accident.

See Also (tip of the hat to DefDog):

Incestuous Amplication Primer

Mario Profaca: US Lacks Cyber-Intelligence + RECAP

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Director of National Intelligence et al (IC), Government, Hill Letters & Testimony, IO Impotency, Law Enforcement, Military
Mario Profaca

US lacks serious cyber intelligence

Study says US government, business need to kick network security up a notch

Michael Cooney

Network World, 12 September 2011

There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current “patch and pray” system won't cut it in the future.

That was the major thrust of a study by the  Intelligence and National Security Alliance's (INSA) Cyber Council  which went on to state that  such a cyber-intelligence discipline will demand discussion of the unique training, education and skill sets that will be required to successfully conduct meaningful collection and analysis in the cyber domain.

Background: Who really sets global cybersecurity standards?

“While there is a great deal of focus on current cyber security issues, there is little focus on defining and exploring the cyber threat environment at a higher level,” INSA stated.  INSA describes itself as a non-profit, non-partisan, public-private organization.

The group says the dilemma that exists in the current cyber intelligence apparatus is that the Department of Homeland Security has the authority but lacks the experience and capabilities to orchestrate a comprehensive approach to cyber intelligence. The Department of Defense has much of the actual cyber intelligence capabilities, and private industry owns most of the infrastructure. “Ultimately, INSA's Cyber Council would like to see a meaningful partnership among all relevant government agencies and the private sector to ensure seamless sharing of threat information, timely analytical judgments, and reasoned, measured responses to clear threats.”

The group made a number of suggestions to help businesses and government build this intelligence community including:

  • Develop strategies (beyond current “patch and pray” processes), policies, doctrines, legal frameworks, and overall global context for cyber intelligence matters
  • Increase global business, diplomatic and other forms of engagement, which should discuss potential ways to create more stability and mutual security in the cyber arena in order to reduce the potential for cyber conflict, theft, sabotage, and espionage
  • Support development of deterrence, dissuasion, and other high level concepts and measures for maintaining peace and stability at all levels of conflict and crisis
  • Define cyber intelligence professions, needed skillsets, training, and education for both industry and government needs.
  • Enable the creation of cyber intelligence related polices, approaches, and pilot efforts across industry, academia/non-profits, and government that provide unclassified situational awareness and indications and warning data, analytics and 24/7 unclassified and classified (as appropriate) reporting to government agencies, trusted industry, and global partners.
  • Corporately define specific activities, plans, and intentions of adversaries; continuously identify current and emerging threat vectors, and support our plans and intentions
  • Identify the specific technical means utilized or planned for cyber attack operations in deep technical detail to include supply chain issues, paths to be exploited, nature and character of deployed infections, systems/product weakness, effects, and anticipated planned or ongoing adjacent activities
  • Maintain detailed cyber situational awareness writ large
  • Participate in the rapid control and release of cyber means in order to ensure a viable intelligence gain and loss awareness
  • Identify what criminal activities are ongoing or have already happened in cyber networks, do formal damage assessments in these areas, and support development of improved defenses
  • Partner on research and development in the challenging areas of attack attribution, warning, damage assessment, and space related threat collection and analysis
  • Organize and support counter-intelligence and counter-espionage (CI/CE) activities, with special focus on identifying/using auditing tools and processes to deal with the insider threats
  • Create a consistent and meaningful approach for the cyber equivalent of Battle Damage Assessment (BDA)/Combat Effectiveness Assessment
  • Establish public-private partnership cyber outreach forums that address these areas in a comprehensive, practical, and executable fashion. These forums can take the form of commissions that study the demand for cyber intelligence and value added to cyber security.

Phi Beta Iota:  The US is not just lacking in cyber-intelligence, it is lacking in all forms of intelligence qua decision-support.  The US intelligence community lacks integrity, and General Keith Alexander and General Jim Clapper and Mr. Mike Vickers have all been given too much money with zero adult leadership.  Top Secret America is a disgracefully dysfunctional enterprise, and now richly deserving of almost complete shut-down.  Congress and the White House have failed to be ethical or intelligent in this matter.

INSA PDF Report

See Also:

Continue reading “Mario Profaca: US Lacks Cyber-Intelligence + RECAP”

ADMIN: Directories Hosed by Microsoft, Fixes Completed

07 Other Atrocities, IO Impotency
Who, Mini-Me?

Astute readers have reported that the various directories are hosed.  Upon investigation we have discovered that when sorted within a Microsoft Word document preparatory to insertion in the final posted directory, the surface titles were sorted, but the links were not.

The interim fix is to use the surface title from the directory in the WordPress search box, that will get right to the correct post.

All the directories have been corrected and so marked.

Once again, Microsoft delivers second rate software.

PLEASE, if you find any links that are not what they should be, send an email to

earthintelnet |at| gmail.com

Owl: Obama Feared Coup in 2008 if Prosecutions of Bush Team, CIA, NSA Went Forward

09 Justice, 10 Security, 11 Society, Corruption, Cultural Intelligence, Government, IO Impotency, Law Enforcement, Military
Who? Who?

Some insights into how Obama team perceived their vulnerability if they went after war crimes during the Bush era.

Obama Team Feared Coup If He Prosecuted War Crimes

By Andrew Kreig

OpEdNews, 7 September 2011

President-Elect Obama's advisers feared in 2008 that authorities would oust him in a coup and that Republicans would block his policy agenda if he prosecuted Bush-era war crimes, according to a law school dean who served as one of Obama's top transition advisers.

University of California at Berkeley Law School Dean Christopher Edley, Jr., above, the sixth highest-ranking member of the 2008 post-election transition team preparing Obama's administration, revealed the team's thinking on Sept. 2 in moderating a forum on 9/11 held by his law school (also known as Boalt Hall). Edley was seeking to explain Obama's “look forward” policy on suspected Bush-era law-breaking that the president-elect announced on a TV talk show in January 2009.

Read full article (three screens).

Continue reading “Owl: Obama Feared Coup in 2008 if Prosecutions of Bush Team, CIA, NSA Went Forward”

Richard Wright: It’s Only Money – Why the IC Continues to Fail & Robert Steele: 10% Grade – A Dishonorable Discharge Needed

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Cyberscams, malware, spam, Director of National Intelligence et al (IC), Government, InfoOps (IO), Intelligence (government), IO Impotency
Richard Wright

Its Only Money

The posting of Jim Bamford’s Politico article on today’s Public Intelligence Blog or rather the accompanying comment on it by Robert Steele [Jim Bamford: How 9/11 Fearmongering Grew NSA Into a Very Expensive Domestic Surveillance Monster] identifies the principal problem with the outrageously expensive NSA.  His comment is directly related to earlier comments he made on a Wall Street Journal article written by General Jim Clapper (USAF ret.) the Director of National Intelligence (DNI) [David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation]  Steele did a brilliant job of refuting the claims that General Clapper advanced in this article about how much the U.S. Intelligence Community (IC) has improved since 9/11. Yet the article really wasn’t serious to begin with because it obviously was written with the purpose of telling the American people what the General wanted them to know. I am sure it was vetted carefully by his staff and possibly CIA as well.

In the interests of clearing the air a bit I would like to add a couple of comments of my own to supplement those that Steele has made.

In the wake of 9/11 people, who did not know what they were talking about, had a good deal to say concerning the “lack of sharing” within the IC. In point of fact NSA and its technical counterpart the National Geo-spatial [Intelligence] Agency (NGA) are required by law to make their products available to analysts holding the proper clearances in entire IC as well as the President and his National Security Staff. The real lack of sharing was and is between the FBI and CIA. The FBI is unwilling to share because its agents fear damaging ongoing investigations while CIA is unwilling to share because its intelligence officers fear compromising sensitive sources. Had this issue been approached with integrity and directly between the two agencies it could have been resolved years ago.

General Clapper argued that the changed “culture” within the intelligence community had made its members much more efficient at dealing transnational terrorist and criminal organizations.  Neither CIA nor NSA has a clue on how to deal with widely dispersed networked type of organizations. Indeed CIA has yet to build a realistic model of the organizational structure or personnel staffing of al Qaeda. CIA’s current methodology of using ‘targeters’ to find and track individual al Qaeda members is simply doing what the original CIA Counter Terrorism Center (CTC) was doing in the 1990s. Indeed their analytic approach is the same as used during the Cold War with “Soviet Type Armed Forces” (the actual name of a class that many of us attended).

Finally there are Bamford’s article and Steele’s comments on it.  Steele in his comments went right to the heart of the matter by noting that NSA was incapable of processing more than a small percentage of the material it collects on a 24/7 basis. This goes directly to an issue that General Clapper clearly did not wish to discuss in his article: for all the money being poured into NSA specifically and the IC more broadly, how much return in enhanced security are we really getting?  It would not seem to make much sense to continue to spend even more money for collection systems to collect ever more traffic if what is being gathered now can’t be adequately processed.

Robert David STEELE Vivas

Robert Steele:  Emphasis added above.  Richard Wright (Retired Reader at Amazon) focuses on the longest largest divide in the US intelligence community itself, as well as the complete abject failure of analysis as a whole and analysis in relation to crime and terrorism, but it bears mention that other divides are equally unattended to by the current leadership:

1)  The secret world ignores 90% of the full-spectrum threat to obsess on counter-terrorism (badly).

2)  The secret world ignores 90% of the Whole of Government customer base, while badly serving the President and a few senior national security officials.  It is worthless on strategy, acquisition, campaign planning, and tactical real-time actionable intelligence in 183 languages.

3)  The secret world ignores 90% of the relevant sources (in 183 languages) and methods (modern human and machine processing that is commonplace within major insurance and financial companies).

On a scale of 100%, ten years after 9/11, the US secret intelligence world earns a grade of 10% (not just failing, but a dishonorable discharge and shame for all eternity).  The Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) are been impotent since their inception, and appear content to continue in that fashion.

noble gold