Journal: Information Overload & Leadership Failure

IO Sense-Making, Methods & Process, Standards, Strategy

Information Overload – Too Much Of A Good Thing?

October 11, 2010 – Everyone has seen the commercial on television. Someone asks a simple question, and then everyone in the crowd starts spewing forth all these facts that have been found via the Internet. This makes for some very clever and funny advertising, but let’s face it. Information overload is a real problem. The magic formula is to deliver the right information to the right people who are searching, at the right time. Sound simple enough, but how many avenues have you been down yourself just because you are looking for a certain recipe for brownies? In a closer look found here, some of the problems that contribute to information overload are discussed.

These include defining findability, an object-centric perspective, an actor-centric perspective, and filters that promote findability. Interesting read.

From the source:

The question is however, is it the abundance of the information that is the problem, or a general lack of maturity in approaches to designing effective organization and access mechanisms? In his presentation at the Web 2.0 Expo in New York City, Clay Shirky referred to this idea as “Filter Failure”. He describes information overload as the normal case and that it’s not necessarily the quantity of information that’s the problem, it’s our ability to filter through what’s there that’s the real issue.

Tip of the Hat to Marjorie M K Hlava at LinkedIn.

Phi Beta Iota: It is not a filter failure.  It is a leadership failure…leadership lacking integrity in the holistic sense of the word, too eager to rush to pay for technical collection solutions that increase the size of their firehose but ignore both the fact that the fires we need to put out are small scattered ones, and the people we need to support require both back office and desktop tools.  All this was well known in 1985 and the solutions fully articulated by 1989.

See Also:

Graphic: Balance Matters

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

Journal: Nature-Hand-Held-Cloud-World Brain

Earth Intelligence, IO Mapping

Full Story Online

New ecology app makes wildlife viewing a cultural sport

Project NOAH and its innovative app are about to go global with a media blitz.

Social media to some is the antithesis of all things nature. With people’s heads often bent over handheld devices, it seems like the last thing they will do is notice a chirping bluebird or flying ladybug overhead. But a new app for the iPhone seeks to change all that. Slate reports that Project NOAH, or networked organisms and habitats, can make your mobile device into a handheld wildlife spotting tool.

Journal: The Activist Power of the Internet

Civil Society, Collective Intelligence, Gift Intelligence, IO Mapping, IO Multinational, IO Sense-Making, Peace Intelligence

Sarah Kessler About 3 hours ago Sarah Kessler 9

Why Social Media Is Reinventing Activism

The argument that social media fosters feel-good clicking rather than actual change, began long before Malcolm Gladwell brought it up in the New Yorker — long enough to generate its own derogatory term. “Slacktivism,” as defined by Urban Dictionary, is “the act of participating in obviously pointless activities as an expedient alternative to actually expending effort to fix a problem.”

If you only measure donations, social media is no champion. The national chapter of the Red Cross, for instance, has 208,500 “likes” on Facebook, more than 200,000 followers on Twitter, and a thriving blog. But according to the Chronicle of Philanthropy, online donations accounted for just 3.6% of private donations made to the organization in 2009.

But social good is a movement still in its infancy. Facebook launched in 2004, YouTube in 2005 and Twitter in 2006. Let’s give the tools a little while to grow up before we start judging them.

All of that virtual liking, following, joining, signing, forwarding, and, yes, clicking, has a lot of potential to grow into big change. Here’s why:

Read the entire piece.

Phi Beta Iota: Complementary observations are made by Steven Denning in his featured post, Reference: The Revolution IS Being Tweeted.

See Also:

Continue reading “Journal: The Activist Power of the Internet”

Journal: Who Controls (and Secures) the Internet?

10 Security, Computer/online security, Cyberscams, malware, spam, IO Secrets, Military, Officers Call
Marcus Aurelius Recommends

Who controls the internet?

By Misha Glenny

Published: October 8 2010 23:40 | Last updated: October 8 2010 23:40

Squared-jawed, with four stars decorating each shoulder, General Keith Alexander looks like a character straight out of an old American war movie. But his old-fashioned appearance belies the fact that the general has a new job that is so 21st-century it could have been dreamed up by a computer games designer. Alexander is the first boss of USCybercom, the United States Cyber Command, in charge of the Pentagon’s sprawling cyber networks and tasked with battling unknown enemies in a virtual world.

CINC CYBER Full Story Online

Last year, US Defense Secretary Robert Gates declared cyberspace to be the “fifth domain” of military operations, alongside land, sea, air and­ space. It is the first man-made military domain, requiring an entirely new Pentagon command. That went fully operational a week ago, marking a new chapter in the history of both warfare and the world wide web.

In his confirmation hearing, General Alexander sounded the alarm, declaring that the Pentagon’s computer systems “are probed 250,000 times an hour, up to six million per day”, and that among those attempting to break in were “more than 140 foreign spy organisations trying to infiltrate US networks”. Congress was left with a dark prophecy ringing in its ears: “It’s only a small step from disrupting to destroying parts of the network.”

Phi Beta Iota: Of the $12 billion a year to be spent, roughly 90% if not more will be spent on “vapor-ware.”  To understand the gap between the 67 people who actually know what needs to be done, and the hundreds of thousands who will be employed in cyber-theater (pun intended), see below.  There are multiple sucking chest wounds in this enterprise, the two largest are a) the DoD Grid is a mess with no integrity in the fullest sense of the word, trying to “secure” that mess is next to impossible; and  b) the only way to make Pentagon information operations safe is to make ALL operations safe, but this is not how the US Government and especially not how the Pentagon thinks–hence, another decade will be wasted.  The upside is that OpenBTS and all sorts of other opens are emergent, and we may all end up going to Web 4.0 while the Pentagon stays at Web 2.0.

See Also:

2010: OPINION–America’s Cyber Scam

1994 Sounding the Alarm on Cyber-Security

Continue reading “Journal: Who Controls (and Secures) the Internet?”

Journal: Nato’s Secret Armies (It’s Not Terror if CIA Pays and Locals Do the Dirty….)

07 Other Atrocities, 10 Security, 11 Society, Corruption, Government, IO Sense-Making, Officers Call, Peace Intelligence
Full Poting Online

Nato's Secret Armies

By Stephen Lendman (about the author) Page 1 of 7 page(s)

In his book, “NATO's Secret Armies: Operation GLADIO and Terrorism in Western Europe,” Daniele Ganser described their clandestine Cold War operations, run by European secret services, collaborating with NATO, the CIA and Britain's MI6 and Secret Intelligence Service (SIS) against a possible Soviet invasion, internal communist takeovers, or others on the political left gaining power.

EXTRACT:

In Italy, against both communist and socialist parties, it was claimed they wanted to weaken NATO “from within,” Italian judge, Felice Casson, learning that right-wing terrorists carried out bombings against civilians, blamed them on the left, neo-fascist Vincenzo Vinciguerra explaining the scheme as follows:

“The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security. This is the political logic that lies behind all the massacres and the bombings which remain unpunished, because the state cannot convict itself or declare itself responsible for what happened.”

In 2000, the Italian Senate was more explicit, saying:

“Those massacres, those bombs, those military actions had been organized or promoted or supported by men inside Italian state institutions and, as had been discovered more recently, by men linked to the structures of United States intelligence,” meaning CIA mainly.

Former director William Colby admitted in his memoirs that covert western armies were a major CIA initiative, begun post-WW II, and restricted “to the smallest possible coterie of the most reliable people, in Washington (and) NATO” to keep the initiative secret.

Phi Beta Iota: CIA's importation of 100 Nazis a year after WWII (and probably many more, it has always considered itself above the law, both domestic and foreign) fueled a truly psychopathic perception of communism that led to policies and programs that today are clearly seen to be crimes against humanity, but back in the day were seen as “collateral damage” essential to contain communism while maintaining “control” over key governments.

See Also:

Continue reading “Journal: Nato's Secret Armies (It's Not Terror if CIA Pays and Locals Do the Dirty….)”

Reference: Open Society on Afghan Views

08 Wild Cards, 11 Society, Cultural Intelligence, IO Sense-Making, Non-Governmental, Peace Intelligence, White Papers
Chuck Spinney Recommends

The below report by the Open Society Foundations (a Soros project) is extremely important and should get the widest distribution.  It documents the cumulative blowback caused by our narcissistic ideas about how to win the hearts and minds of the Afghans.  It does this by systematically examining the views of a wide variety of Afghans in an effort to construct an Afghan narrative of how the intervention is affecting their lives. That this narrative is often at variance with our views (which makes it easy to dismiss by western military leaders), the report shows why this is really quite beside the point.  Of particular interest (at least to me) is the Afghan narrative of the psychological effects of collateral damage cause by our all-seeing, all-knowing precision strike systems. It is a classic on how the ongoing self-referencing BS about the performance of these weapons is blowing back on itself to magnify the atmosphere of mistrust and alienation that is playing directly into the success of the insurgent's guerrilla strategy.

Of course, this report might be easily dismissed by those patriotic Amurikans, drunk on High Tea, as the subversive product of the lefty Hungarian-emigre George Soros, who is, after all, just another ‘other.'

Downloadable PDF

Phi Beta Iota: A properly managed intelligence campaign would have anticipated and then closely monitored this kind of situational awareness.  It is called “Intelligence Preparation of the Battlefield.”  Neither CIA nor DIA know how to do this.

See Also:

Reference: Fixing Intel–A Blueprint for Making Intelligence Relevant in Afghanistan

Review: Operation Dark Heart–Spycraft and Special Ops on the Frontlines of Afghanistan — and the Path to Victory

Review: Surrender to Kindness (One Man’s Epic Journey for Love and Peace)

2010 INTELLIGENCE FOR EARTH: Clarity, Diversity, Integrity, & Sustainability