Journal: Historian’s View of CIA, Yemen, and Air Threat

03 India, 08 Wild Cards, 09 Terrorism, 10 Security, Ethics, Government, IO Secrets, Law Enforcement, Peace Intelligence
Webster Griffin Tarpley

Russia Times Lead Story

Detroit jet terrorist attack was staged – journalist

The recent failed attack on a US passenger jet traveling from Amsterdam to Detroit was a set-up provocation controlled by US intelligence, author and journalist Webster Tarpley stated to RT.

“[The terrorist’s] father, a rich Nigerian banker, went to the US embassy in Nigeria on November 19 and said ‘my son is in Yemen in a terrorist camp, do something about this.’ Nevertheless, the son is allowed to buy a ticket in Ghana, paying cash, $2,800, for a one-way ticket,” Tarpley said.

After that, a mentally deficient young man who doubtfully could make it from one gate to another managed to illegally enter Nigeria and get on a plane to Amsterdam.

“There was a well-dressed Indian man who brought him to the gate and said, ‘my friend does not have a passport, get him on, he is Sudanese, we do this all the time – that is impossible!” said Tarpley.

Continue reading “Journal: Historian's View of CIA, Yemen, and Air Threat”

Graphic: Jim Bamford on the Human Brain

Advanced Cyber/IO, Balance, Innovation

This is, in our humble opinion, the single most important sentence in the entire literature of intellience, from a practical stand-point.  There are other sentences on ethics, on leadership, on focus, but in terms of the root nature of the intelligence discipline and all that is wrong with the USA approach to this discipline, this sentence is our favorite.

It is the last sentence on the last page of his second book, BODY OF SECRETS.

Typos fixed 28 Dec 09

Journal: The Demise of US Intelligence Qua Brains

Collaboration Zones, Communities of Practice, Ethics, Information Operations (IO), Key Players, Methods & Process, Mobile, Policies, Real Time, Reform, Strategy, Threats
Full Story Online

sensible memo from BTC: Aviation Security After Detroit
INDUSTRY ANALYSIS: Aviation System Security
Business Travel Coalition December 27, 2009
By Kevin Mitchell

The Christmas attempt by a Nigerian man with PETN (one of the most powerful explosives known) affixed to his body to cause harm to an internationally-originated Delta Air Lines flight on approach to Detroit shone a bright light on much that is wrong with the U.S. approach to aviation system security. It is welcome news that President Obama has ordered an airline industry security review so long as it is strategic in nature.

. . . . . . .

The immediate post 9/11 security priority for the U.S. was to prevent a commercial airline from ever again being used as a weapon-of-mass-destruction. Airport screening was strengthened substantially, the Air Marshall program was expanded, cabin and cockpit crews were trained in advanced anti-terrorism techniques, many pilots were armed, F-14s were placed on alert, and most importantly, cockpit doors were reinforced and passengers were forever transformed from passive participants in a time of threat to able defenders. All of this was accomplished within a relatively short period of time after the U.S. was attacked on 9/11.

From that point forward the highest and best use of each incremental security dollar spent should have been on intelligence gathering, risk-management analysis and sharing, and on fundamental police work such that terrorists would never reach an airport, much less board an airplane. What does the immediate investigation into the near-calamity on Christmas reveal?

• The father of the accused terrorist, Umar Farouk Abdulmutallab, informed U.S. officials months ago that he was concerned about his son’s extreme religious views. Not a friend, not a teacher, but his very own father issued the warning!

• The accused Nigerian is in the Terrorist Identities Datamart Environment database (550K names) maintained by the U.S. National Counterterrorism Center. While not on the selectee list (14K names) or no-fly list (4K names), should not some of our scarce security dollars have been used to ensure that he was placed on the selectee list, questioned and subjected to extra searching prior to being allowed to board the Detroit-bound flight from Amsterdam?

U.S. Homeland Security Secretary Janet Napolitano appeared today on ABC’s This Week show and unabashedly steered clear of government accountability arguing that the U.S. did not have enough information to keep the accused man from boarding the flight or to add him to the selectee or no-fly list. However, his very father warned us! Moreover, the UK’s Daily Mail reports that Umar Farouk Abdulmutallab was banned from Britain; his last visa request refused! That the suspect did not but should have received additional questioning and physical screening is where the U.S. government’s focus should be, versus on the in-flight security illusion of restricted passenger movement, if it is intended to be more that temporary.

Continue reading “Journal: The Demise of US Intelligence Qua Brains”

Journal: Life in the Cloud–Repeating Past Mistakes

Communities of Practice, Ethics, IO Secrets, Key Players, Mobile, Policies, Real Time, Threats
Full Story Online

January/February 2010

Security in the Ether

Information technology's next grand challenge will be to secure the cloud–and prove we can trust it.

By David Talbot

Phi Beta Iota: The story is so good we will not extract from it.  It must be read in its entirety.  Government is failing to do its job, leaving a “wild west” environment alive and corruptible in the cloud.  Standards are beginning to emerge but security is not a priority and the end-user as the ultimate source of the security is not even being considered (over ten years ago Eric Hughes conceptualized anonymous banking and end-user controlled encryption of all data).  Eventually, after great expesne and great loss of data, government and industry may realize that the ultimate security is that which originates with the individual end-user, not a central service that can be hacked by disgruntled insiders or that can make a mistake that instantly explodes tens of millions of clients.  Below is the original Mich Kabay slide, still relevant.

Mich Kabay's Threat Slide Link Leads to NSA Las Vegas Briefing

Worth a Look: First Ever UN Joint Military Analysis Centre Course (October 2009)

IO Sense-Making, Peace Intelligence

Course Information
Course Information

First UN Joint Mission Analyses Centre Course (UNJMAC) ever held

The last seven days of October have been groundbreaking and interesting at Nodefic. A new course has been born and introduced to life.

Text: Maj Erik Haugstad
Tasked by the UN, and in close cooperation with other NORDCAPS countries, a pilot course for personnel going to serve in JMACs around the world has been conducted at Nodefic. Being a pilot course for the UN, this is of course the first time ever a course like this has been held in the world.

Knowing as much as possible about the area and environment, in which we are participating in a peace support operation, is of vital importance for the contribution of the International Society to succeed. This has been common knowledge throughout times. A slight rewrite of Sun Tzu’s “Know your enemy”, will lead us to the very same conclusion. For a long time, also reflected in the philosophy of integrated missions, the UN has recognized that the need for coordination and sharing of information is essential for operational efficiency and mission accomplishment. In the UN Missions we have for some time seen the gradual introduction and testing of the JMAC, Joint Mission Analyses Centre, concept.

UN JMAC postponed

Our UN JMAC Course, scheduled for November 3 to 14, has been postponed as requested by UN DPKO.

The course will instead be conducted from 9-20 March 2009 at our peacekeeping training centre in Oslo.
We will come back with invites and more information in due time.

Phi Beta Iota: A Multinational Information Sharing Course, also under UN auspices, is offered in Sweden by the Folke Bernadette Academy, as developed by Col Jan-Inge Svensson, Land Forces (Ret), one of the UN intelligence pioneers, see Who’s Who in Peace Intelligence: Jan-Inge Svensson and also  Books: Intelligence for Peace (PKI Book Two) Finalizing.