Rule 1: Don’t Throw Stones From a Glass House

07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Advanced Cyber/IO, Articles & Chapters, Computer/online security, Corruption, Cyberscams, malware, spam, Government, IO Technologies, Military, Technologies
DefDog Recommends...

REFERENCE

Lessons from Anonymous on cyberwar

A cyberwar is brewing, and Anonymous reprisal attacks on HBGary Federal shows how deep the war goes.

Haroon Meer 10 Mar 2011 16:11 GMT

Al Jazeera

. . . . . . .

Even while Barr was proclaiming victory and threatening to “take the gloves off”, Anonymous were burrowing deeper into his network.

By the end of the attack, Barr's iPad was reputedly erased, his LinkedIn and Twitter accounts were hijacked, the HBGary Federal website was defaced, proprietary HBGary source code was stolen and with over 71,000 private emails now published to the internet, HBGary was laid bare.

In this, was our first lesson: The asymmetry of cyber warfare.

. . . . . . .

Read entire REFERENCE piece….

Continue reading “Rule 1: Don't Throw Stones From a Glass House”

Worth a Look: OpenBeacon

IO Technologies, Mobile, Worth A Look
Michel Bauwenss

OpenBeacon Press News

Background information on OpenBeacon social networking features as used in our sister project SocioPatterns.org:

Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks

Live Social Semantics

Phi Beta Iota: This is the secret sauce for connecting the digital “virtual” revolutionary circles, and the same circles on the street face to face.  It has been used for years at Hackers on Planet Earth (HOPE), and is a modern day version of the self-identification pins of Charles Fourier.  Imagine now if every American committed to destroying the two-party tyranny and achieving Electoral Reform were to buy and wear one of these.  It would create a critical mass–a constantly live, interactive, irrepressible swarm for the restoration of the Republic.

Click Here for More Information

 

OpenMoko, OpenBTS, Free Your Phone & Humanity

11 Society, Advanced Cyber/IO, Autonomous Internet, Collaboration Zones, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, IO Technologies, Mobile

Openmoko™ – Open. Mobile. Free.

Openmoko™ is a project dedicated to delivering mobile phones with an open source software stack. Openmoko was earlier more directly associated with Openmoko Inc, but is nowadays a gathering of people with the shared goal of “Free Your Phone”. Distributors are currently selling updated versions of the Openmoko Inc's phone released in 2008, Neo FreeRunner, to advanced users, while the software stack for FreeRunner and future free phones is being developed by the community.

Burning Man's open source cell phone system could help save the world

Solar-powered OpenBTS systems costs pennies a day and operates in the farthest outreaches of Earth.

By Julie Bort, Network World
August 30, 2010 02:47 PM ET

Today I bring you a story that has it all: a solar-powered, low-cost, open source cellular network that's revolutionizing coverage in underprivileged and off-grid spots. It uses VoIP yet works with existing cell phones. It has pedigreed founders. Best of all, it is part of the sex, drugs and art collectively known as Burning Man. Where do you want me to begin?

The Open Source Subnet
Cell towers that blend vs. those that offend

“We make GSM look like a wireless access point. We make it that simple,” describes one of the project's three founders, Glenn Edens.

Read rest of article….

Continue reading “OpenMoko, OpenBTS, Free Your Phone & Humanity”

Egypt Online Access Work-Arounds Updated

05 Civil War, 07 Other Atrocities, Advanced Cyber/IO, Civil Society, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, InfoOps (IO), IO Multinational, IO Technologies, Methods & Process, Mobile

Despite Severed Connections, Egyptians Get Back Online

Nicholas Jackson

The Atlantic, 29 January 2011

As the #jan25 revolution continues in Egypt, many people are finding that some of the oldest tricks in the book are working to get them connected, which authorities have tried to stop from happening with enforced curfews and cuts to Internet service.

Read rest of article….

Without Internet, Egyptians find new ways to get online

IDG News Service – “When countries block, we evolve,” an activist with the group We Rebuild wrote in a Twitter message Friday.

That's just what many Egyptians have been doing this week, as groups like We Rebuild scramble to keep the country connected to the outside world, turning to landline telephones, fax machines and even ham radio to keep information flowing in and out of the country.

Read rest of article….

Search: return of investment for information sys

InfoOps (IO), Intelligence (government), IO Sense-Making, IO Technologies, Methods & Process, Officers Call, Technologies

This search is a VERY important one, and does not yield the correct answer, which is in itself an indictment of information technology.

The correct answer is NEGATIVE, and Paul Strassmann, former Director of Defense Information, is the person who established this fact for the top corporations, although he likes to soft-shoe it and say neutral or negative.   NOT positive.  There is no Return on Investment (RoI) for information technology in and of itself.  He first disclosed this in his keynote luncheon presentation at OSS '96, and then published a book.  Both links are below. Paul Strassmann is one of our heroes–he has NOT been listened to carefully enough, and is in our little black book as a “must have” advisor for any future Information Operations (IO) “break-out” but only if he signs a non-compete and forgoes any association with any of the vendors selling vapor-ware (which is to say, all of them).

1996 Strassmann (US) U.S. Knowledge Assets: Choice Traget for Information Crime

Review: Information Productivity–Assessing Information Management Costs of U. S. Corporations

In Case of DoD Specifically:

2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid

2004 General Accountability Office (GAO) Report: Defense Acquisitiions: The Global Information Grid and Challenges Facing Its Implementation

2002 The New Craft of Intelligence–What Should the T Be Doing to the I in IT?

See Also:

Graphic: Cyber-Threat 101

Graphic: Tony Zinni on 4% “At Best”

Graphic: Jim Bamford on the Human Brain

Journal: Return on Investment Missing from IT World

Journal: Systems Design & “Reverse Innovation”

Journal: Bees’ tiny brains beat computers

Continue reading “Search: return of investment for information sys”

Journal: CIA WikiLeaks Task Force (aka WTF, One Down From REMF)

07 Other Atrocities, Computer/online security, Cultural Intelligence, Government, InfoOps (IO), IO Sense-Making, IO Technologies, Officers Call, Policies
Marcus Aurelius Recommends

washingtonpost.com

CIA launches task force to assess impact of U.S. cables' exposure by WikiLeaks

By Greg Miller Wednesday, December 22, 2010; 12:24 AM

The CIA has launched a task force to assess the impact of the exposure of thousands of U.S. diplomatic cables and military files by WikiLeaks.

Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: W.T.F.

The irreverence is perhaps understandable for an agency that has been relatively unscathed by WikiLeaks. Only a handful of CIA files have surfaced on the WikiLeaks Web site, and records from other agencies posted online reveal remarkably little about CIA employees or operations.

Read full article….

Very cool map and other graphics

Phi Beta Iota: We understand that CIA used to handle Department of State Embassy traffic, and the ugly little fact associated with WikiLeaks, that the Department of Defense is now handling Department of State traffic, has been buried.  The DoD “Grid” is hosed and is never going to be fixed absent a a clean sheet break from the legacy and the contractors.  GAO is interested in doing an update to its first two damning indictments of DoD's Swiss Cheese Communications environment, it just needs one Member of Congress to ask for it….

Afterthought: CIA had a chance in 1986, under Bill Donnelly (DDA), Ken Weslick (C/DO/IMS), and Robert Steele (PM Project George (Smiley)), in combination with the superb work of Gordon Oehler, Dennis McCormick, and Diane Webb in in DI/OSWR, to get  it right.  They were specifically told at the highest levels that they needed to do two things: change the paradigm from “once in, everything visible” to “need to know tracking and accountablity,” and implement the “reverse hit” strategy that disclosed need to know hits to the owner of the clandestine or covert information rather than the seeker.  With Bill Casey's death CIA lost whatever chance it had of entering the 21st Century moderately coherent.  We have wasted close to a quarter century because DoD had a death drip on ADA and refused to contemplate object-oriented programming or open source software for decades beyond ADA's natural death, and OMB gave up the concept of inter-agency interoperability and secure information-sharing in the 1980's.  At the same time, the National Information Infrastructure was all theater and no security.  Marty Harris meant well, but he simply would not focus on fundamentals such as code-level security, education, and strict classification limitations.

See Also:

2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise

2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid

2004 General Accountability Office (GAO) Report: Defense Acquisitiions: The Global Information Grid and Challenges Facing Its Implementation

Journal: Pentagon Flails in Defending Cyberspace

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

2011 Top 10 Cyber Predictions (and Then Some)

Collaboration Zones, Communities of Practice, Computer/online security, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, IO Sense-Making, IO Technologies, Key Players, Methods & Process, Mobile, Officers Call, Policies, Real Time, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats

2011 Top 10 Cyber Predictions

Posted by Anup Ghosh on December 16, 2010

Everybody is putting out their Top 10 lists of predictions for 2011. Not to be left out of the party, below is a list of what we expect to see in 2011 in Cyber Security.

1.  Malware.

2.  Blame the User.

3.  Reactive approaches to security will continue to fail.

4.  Major Breaches in Sectors with Intellectual Property.

5.  Hacktivists will bask in their new-found glory.

6.  Critical Infrastructure Attacks.

7.  Hello Android.

8.  Windows Kernel Exploits.

9.  Organized Crime rises.

10.  Congress will rear its head.

Read full paragraph that goes with each of the above….

Phi Beta Iota: Nothing wrong with any of the above, except that they are out of context.  As the still-valid cyber-threat slide created by Mitch Kabay in the 1990's shows, 70% of our losses have nothing to do with disgruntled or dishonest insiders, or external attacks including viruses.  Cyber has not been defined, in part because the Human Intelligence crowd does not compute circuits, and the circuit crowd do not computer human intelligence.  We are at the very beginning of a startling renaissance in cyber/Information Operations (IO) in which–we predict–existing and near-term hardware and software vulnerabilities will be less than 30% of the problem.  Getting analog Cold War leaders into new mind-sets, and educating all hands toward sharing rather than hoarding, toward multinational rather than unilateral, will be key aspects of our progress.  Cyber is life, life is cyber–it's all connected.  Stove-piped “solutions” make it worse.

See Also:

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Journal: 1 in 4 Fail US Army Extrance Exam

Journal: Development at Gunpoint? Wasteful & Wrong

Undersea Cables: The Achilles Heel of our Economies

Journal: NSA Assumes It Has Been Compromised…Correct!

Reference: Frog 6 Guidance 2010-2020