Journal: World Bank Data Gaining Intelligence

IO Mapping, IO Multinational, IO Sense-Making

Full Story Online

Widgets, maps and an API make World Bank data sing

The new data.worldbank.org looks to improve data-driven decisions.

The new data.worldbank.org website that's launching today is designed to make the vast wealth of open data easier to use. The Bank is increasing the number of indicators available on the site from 339 to more than 1,200, and it has substantially improved its API. Four different languages are supported on the site, along with an improved data browser, feedback buttons, instant search, and embeddable widgets.

Tip of the Hat to Bob Gourley at LinkedIn.

Journal: YouTube Time Machine, Future of Education

Analysis, Augmented Reality, Collaboration Zones, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Historic Contributions, History, info-graphics/data-visualization, InfoOps (IO), International Aid, IO Mapping, IO Multinational, IO Sense-Making, Journalism/Free-Press/Censorship, Key Players, Maps, Methods & Process, Mobile, Open Government, Policies, Reform, Research resources, Strategy, Technologies, Threats, Tools, YouTube

YouTube Time Machine

YouTube Time Machine

Right now the Categories include, in this order:  Video Games,  Television,  Commercials,  Current Events,  Sports, Movies,  Music.

Phi Beta Iota: Now imagine this in all languages, available on the cell phone, as an educational tool that also harnesses the cognitive surplus–the distributed intelligence–of the Whole Earth.  Our view of YouTube is now such that we consider it more important than Google.

Also see YouTube.com/leanback (use search at top of leanback page)

Journal: Information Operations Strategy

IO Multinational, IO Sense-Making
Full Article Online

Lieutenant Colonel Hans F. Palaoro, USAF, wrote this essay while a student at the Industrial College of the Armed Forces. It won the Strategy Article category of the 2010 Chairman of the Joint Chiefs of Staff Strategic Essay Competition.

EXTRACT:   While information power is well accepted as one of the four elements of national power, neither the term nor the concept appeared in the 2006 National Security Strategy. It is strangely absent from the “full array of political, economic, diplomatic, and other tools at our disposal” that is the basis of the document.4 Nor does information power appear in the 2008 National Defense Strategy.5 Moreover, although there is no vetted definition of information power, the concept is understood and the link to how the military should exercise it is obvious: information operations. Considerable attention has already been given to the “defensive” side of the information domain.6 What is still lacking is the offense.

The problem with the current IO model is that it fails to orchestrate the tools of information power toward a common goal. One reason is that the legal and bureaucratic limits on who can do certain things have caused an almost irrational phobia against integrated efforts. For example, fear of crosscontamination of public affairs (PA), public diplomacy (PD), and strategic communication with psychological operations (PSYOP) actively opposes effective coordination of these obviously interdependent tools of information strategy.

Tip of the Hat to Dale Mark Benedict at LinkedIn.

Continue reading “Journal: Information Operations Strategy”

Journal: Cognitive Dissonance in Afghanistan Part II

Cultural Intelligence, IO Multinational, IO Sense-Making, Military, Officers Call, Peace Intelligence
Col Lawrence Sellin: Traitor or Truth-Teller?

Fired colonel calls PowerPoint a crutch

Army Times, By Andrew Tilghman – Staff writer
Posted : Thursday Sep 9, 2010 8:29:12 EDT

Army Reserve Col. Lawrence Sellin has no regrets about publishing a rant about the military’s overreliance on PowerPoint presentations — despite the fact it got him fired from his job at joint command headquarters in Afghanistan.

. . . . . . .

Sellin said his controversial article was the last of several efforts to find something meaningful to do at ISAF headquarters.

. . . . . .

Sellin’s screed highlights a long-simmering controversy inside the military bureaucracy.

Marine Gen. James Mattis, currently chief of U.S. Central Command, told a military conference earlier this year that “PowerPoint makes us stupid.”

And Army Brig. Gen. H.R. McMaster banned PowerPoint presentations as a brigade commander during his successful efforts to secure the northern Iraqi city of Tal Afar in 2005.

Sellin said his complaint is not solely about PowerPoint, the presentation software created in 1987.

“I don’t hate PowerPoint. It’s a useful tool,” he said. “But it can be a crutch as a substitute for thinking. It’s too easy to produce a lot of slides and create volume, not quality. You really think that with a lot of detailed slides that you’re making progress, when you are actually not.”

Continue reading “Journal: Cognitive Dissonance in Afghanistan Part II”

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Hacking, IO Multinational, IO Secrets, IO Sense-Making, Military, Peace Intelligence
Marcus Aurelius Recommends

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don't think this is it.  This is a simplistic approach, the sort of thing the KGB did and presumably the sort of the SVR continues to do.

By the way, IMHO, 91K classified documents on the Internet is not some sort of an inadvertent security violation.  It's almost certainly one of the national security crimes; I think it's treason. Better to concentrate on the perpetrator — try him, convict him, and then, maybe, violate in some significant ways his Constitutional protection against “cruel and unusual punishment” as a highly visible deterrent against espionage.

NOTE:  Image links to source generally as persistent link not available.

Below the line: PBI comment and cyber-security recap (34).

Continue reading “Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)”

Journal: Pentagon Flails in Defending Cyberspace

03 Economy, 04 Education, 10 Security, 11 Society, Corruption, IO Multinational, IO Secrets, Military, Officers Call
Marcus Aurelius Recommends

Beyond belief, but here it is: the “official” explanation of why we are going to waste 12 billion dollars a year on contractors without a clue (vapor-ware).   There is zero return on investment here for the taxpayer, only for the contractors and Congress, neither of which will be held accountable for fraud, waste, and abuse.

See Also:

2010: OPINION–America’s Cyber Scam
2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise
2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid
Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101
Journal: Pentagon’s Joint Strike Fighter (JSF) as a Metaphor for a Predictable Defense Meltdown


ESSAY

Defending a New Domain

The Pentagon's Cyberstrategy

William J. Lynn III
WILLIAM J. LYNN III is U.S. Deputy Secretary of Defense.

In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. The flash drive's malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.

Read Entire Article Below the Line.

Continue reading “Journal: Pentagon Flails in Defending Cyberspace”

Journal: Human-Centered Computing (Not…)

Analysis, Augmented Reality, Civil Society, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, info-graphics/data-visualization, InfoOps (IO), IO Multinational, Open Government, Reform

Human-centered computing should be–but is not today–about connecting all humans with all information in near-real-time, while providing back office tools that elevate the human brain and more properly plan information and communications technologies in a support role.  See for example our Citizen-Centered Graphics and all of the OSS/EIN Books.  Where the emergent meme is off-target is in focusing on the relationship of the computer to the individual, rather than the whole.  Hacking Humanity is the new meme.

TRADITIONAL

Human-Centered Computing (Wikipedia)
Human-Centered Computing Cluster (HCC)
Human-Centered Computing in Education (Links)
Human-Centered Computing: A Multi-Media Perspective (PDF circa 2005)

WORLD-BRAIN ORIENTATION

Review: The World Is Open–How Web Technology Is Revolutionizing Education
Review: Making Learning Whole–How Seven Principles of Teaching can Transform Education
Review (Guest): Cognitive Surplus–Creativity and Generosity in a Connected Age
2010: Human Intelligence (HUMINT) Trilogy Updated
Review: Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of Evolution
Review: Consilience–the Unity of Knowledge
Review: The Unfinished Revolution–Human-Centered Computers and What They Can Do For Us
Review: Philosophy and the Social Problem–The Annotated Edition

See Also:

Worth a Look: Book Reviews on Technology & Web 2.0 to 4.0