Secrecy News Headlines

10 Security, 10 Transnational Crime, Corruption, Government, IO Multinational, Law Enforcement, Methods & Process

**      ODNI ISSUES NEW SECURITY STANDARDS FOR INTEL FACILITIES

**      INFORMATION SHARING: FEAST OR FAMINE

**      POLYGRAPH TESTING AGAINST BORDER CORRUPTION

Phi Beta Iota: As long as the IC persists in sticking with the TS/SCI “all or nothing” approach to information, it will continue to fail in serving the  needs of virtually all of the current and all of the unrecognized but potentially legitimate customers for its proven sources and methods.  The Open Source Agency under diplomatic auspices, that includes both the 50 community intelligence networks managed by the National Guard as well as the Multinational Decision Support Centre with regional multinational Stations, are necessary first steps if intelligence is to be useful into the future.

Regarding the polygraph, it works and has been hugely successful within the International Commission Against Impunity in Guatemala (CICIG) and within the Government of Guatemala itself, with two major caveats: 1) polygraph results must be reported directly to the leadership by the polygraphers, we have seen polygraphs manipulated or fabricated by security managers intent on achieving specific personnel or political or budget goals; and 2)  out of area polygraphers are essential–in Central America, and we suspect in the Southwest border region as well, most local polygraphers have been employed by and well compensated by and are deathly afraid of, the narco-traffickers who know how to use the polygraph to keep their own ranks free of penetrations and betrayal from within.  A global cadre of polygraphers under deep cover is needed.

Officer’s Call: LinkedIn and Facebook

Information Operations (IO), Officers Call

Phi Beta Iota respectfully encourages all officers and staff non-commissioned officers to join LinkedIn and Facebook so as to enhance the sharing of information across boundaries.

The “secret” to surviving a security review is to avoid all personal expressions of opinion.  Use the systems to create networks of professionals with common interests (e.g. Information Operations) who can then post links that are seen by their network.  Provocative questions are different from opinions, and can be used to point out disconnects that might not be obvious.

Opinions are dangerous.  Although the security system has improved considerably, all the way from a reasonably clear security form [only foreigners with ties that bind] to reasonably coherent adjudication, the Industrial-Era security system is still not up to understanding the nuances of Information-Era information-sharing and sense-making.  “That should be classified” is the operative phrase for those who can do grave damage to careers without realizing that public intelligence has far surpassed secret intelligence in breadth and depth.

Bottom line:  you cannot grow as a professional without “jacking in” to the global grid, but opinions will have to wait for another five or six years.  Leave those for face to face conversations and be aware that your email is a legal record open for inspection whether you like it or not.

Journal: Turkey’s Emerging Grand Strategy

02 Diplomacy, 08 Wild Cards, Civil Society, Cultural Intelligence, Government, IO Multinational, IO Sense-Making, Peace Intelligence
Chuck Spinney Recommends

This op-ed is consistent with what I have learned about and experienced in Turkey.  Chuck

nytlogo153x23.gif

October 25, 2010

Turkey Steps Out

By ROGER COHEN

ANKARA — Davutogluism is a mouthful. It’s not going to make Fox News any time soon. But if I could escort Sarah Palin, Tea Partiers and a few bigoted anti-Muslim Europeans to a single country illustrating how the world has changed, it would be the home of the D-word, Turkey.

Ahmet Davutoglu, who birthed a foreign policy doctrine and has been Turkey’s foreign minister since May 2009, has irked a lot of Americans. He’s seen as the man behind Turkey’s “turning East,” as Iran’s friend, as Israel’s foe, as a fickle NATO ally wary of a proposed new missile shield, and as the wily architect of Turkey’s new darling status with Arab states. The Obama administration has said it is “disappointed” in Turkey’s no vote on Iran sanctions last June; Congress is not pleased, holding up an ambassadorial appointment and huffing over arms sales.

Nostalgia is running high in Washington for the pliant Turkey of Cold-War days. Davutoglu is having none of it. “We don’t want to be a frontier country like in the Cold War,” he told me. “We don’t want problems with any neighbor” — and that, of course, would include Iran.

Zero problems with neighbors lay at the core of Davutoglu’s influential book Strategic Depth, published in 2001. Annual trade with Russia has since soared to $40 billion. Syrian-Turkish relations have never been better. Turkey’s commercial sway over northern Iraq is overwhelming. It has signed a free trade agreement with Jordan. And now Turkey says it aims — United Nations sanctions notwithstanding — to triple trade with Iran over the next five years.

All this makes the anemic West edgy: The policy has produced 7 percent growth this year. There’s also something deeper at work: The idea of economic interdependence as a basis for regional peace and stability sounds awfully familiar. Wasn’t that the genius of the European Union idea?

Read rest of this very serious article….

Phi Beta Iota: The author produced Alternative Paradigms in 1993, this book is available in English. At the time he was  Professor of Political Science at the International Islamic University in Malaysia.  Turkey is a world power, as is Iran, anyone who cannot get a grip on that reality will be flattened by reality.  The axis between Malaysia and Indonesia, and between Muslims in Asia and Muslims centered on Dubai, is going to strengthen.

Ahmet Davutoglu
Ahmet Davutoglu Strategic Depth

2010 Reference: The Pentagon, Information Operations, and Media Development

02 Diplomacy, 10 Security, Cultural Intelligence, InfoOps (IO), IO Multinational, IO Secrets, Media, Media Reports, Military, Peace Intelligence, White Papers
Report Online

CIMA is pleased to release a new report, The Pentagon, Information Operations, and Media Development, by Peter Cary, a veteran journalist with extensive experience reporting about the U.S. military. As part of its post-9/11 strategy, the Department of Defense has launched a multi-front information war, both to support its troops on the ground and to counter the propaganda of radical Muslim extremists. The DoD’s global public relations war, however, has fostered criticism that the department has over-reached and tarred the efforts of non-DoD Americans doing media development work abroad.

While the DoD cannot be criticized for trying to protect the lives of its soldiers, it has spent vast amounts of money on media operations–which can tend to be conducted in secrecy and whose effectiveness often cannot be measured. This report examines the impact of DoD information operations on international media development efforts and offers recommendations – including that the DoD leave media activities that could be considered public diplomacy to the State Department.

Tip of the Hat to Niels Groeneveld at LinkedIn.

2010 Julian Harston “Intelligence Assessment and Risk Analysis in Peacekeeping and Peace Support Operations – A Necessity”

Advanced Cyber/IO, Ethics, Non-Governmental, Peace Intelligence, United Nations & NGOs

Intelligence Assessment and Risk Analysis in Peacekeeping and Peace Support Operations – A necessity.

Julian Harston, United Nations, Assistant Secretary General (rtd)

October 2010

Document:  2010 JMAC Speech Julian Harston

‘We are fully aware of your long-standing limitations in gathering information. The limitations are inherent in the very nature of the United Nations and therefore of any operation conducted by it.’

UN Secretary-General U Thant to the Commander of the UN Operation in the Congo (UNOC), Lt-Gen. Kebbede Guebre, in a coded cable on 24 September 1962.

“Through error, misjudgment and an inability to recognize the scope of the evil confronting us, we failed to do our part to save the people of Srebrenica from mass murder.”

Kofi Annan

Continue reading “2010 Julian Harston “Intelligence Assessment and Risk Analysis in Peacekeeping and Peace Support Operations – A Necessity””

Reference: Reader-to-Leader Framework–Motivating Technology-Mediated Social Participation

Collective Intelligence, Collective Intelligence, Communities of Practice, Cultural Intelligence, info-graphics/data-visualization, InfoOps (IO), IO Mapping, IO Multinational, Methods & Process, Mobile, Open Government, Standards, Strategy, Tools

The Reader-to-Leader Framework: Motivating Technology-Mediated Social Participation

Jennifer Preece, University of Maryland1
Ben Shneiderman, University of Maryland2

Abstract

Billions of people participate in online social activities. Most users participate as readers of discussion boards, searchers of blog posts, or viewers of photos. A fraction of users become contributors of user-generated content by writing consumer product reviews, uploading travel photos, or expressing political opinions. Some users move beyond such individual efforts to become collaborators, forming tightly connected groups with lively discussions whose outcome might be a Wikipedia article or a carefully edited YouTube video. A small fraction of users becomes leaders, who participate in governance by setting and upholding policies, repairing vandalized materials, or mentoring novices. We analyze these activities and offer the Reader-to-Leader Framework with the goal of helping researchers, designers, and managers understand what motivates technology-mediated social participation. This will enable them to improve interface design and social support for their companies, government agencies, and non-governmental organizations. These improvements could reduce the number of failed projects, while accelerating the application of social media for national priorities such as healthcare, energy sustainability, emergency response, economic development, education, and more.

Recommended Citation

Preece, Jennifer and Shneiderman, Ben (2009) “The Reader-to-Leader Framework: Motivating Technology-Mediated Social Participation,” AIS Transactions on Human-Computer Interaction (1) 1, pp. 13-32
Available at: http://aisel.aisnet.org/thci/vol1/iss1/5

Visit Home to Download Free

Reference: Science 2.0 by Ben Shneiderman

Articles & Chapters, Collective Intelligence, Communities of Practice, Cultural Intelligence, info-graphics/data-visualization, IO Mapping, IO Multinational, Mobile, Open Government, Strategy, Tools

Click on Image to Enlarge

Read Source Article, Science 2.0 (2008-07-03)

Phi Beta Iota: Eugene Garfield gave us citation analysis via the Institute for Scientific Information, and Dick Klavans and company have given us the (fragmented) web of knowledge.  Top commercial intelligence practitioners have long known that published experts can lead to unpublished experts without which ground truth cannot be determined.  If citations are the “things” that can be measured, “relationships” or “transactions” are the intangibles between the spaces, the Ying of the Yang.  This article is important in part because it coincides with MajGen Robert Scales, USA (Ret) view that WWI was about chemistry, WWII was about physics, WWIII was about information, and WWIV is about human factors.

See Also:

Reference: 27 Sep MajGen Robert Scales, USA (Ret), PhD

Search: The Future of OSINT [is M4IS2-Multinational]

2010: Human Intelligence (HUMINT) Trilogy Updated

2010 INTELLIGENCE FOR EARTH: Clarity, Diversity, Integrity, & Sustainability