IO Newsletter Volume 10 Number 4

IO Newsletter
IO Newsletter V 10 N 04
IO Newsletter V 10 N 04

Articles in this issue

1.         How Team of Geeks Cracked Spy Trade

2.         Civilization's High Stakes Cyber-Struggle: Q&A Gen. Wesley Clark (ret.)

3.         Academy Explores Expanding Cyberwarfare Training

4.         Directive Number 9

5.         YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer

6.         Air Force ISR, EW To Stay Independent

7.         China’s military says website had 2.3 million attacks

8.         Intelligence Ops Greatest Chinese Threat to U.S.

9.         Congressional commission focuses on China's cyberwar capability

10.       NSA Iraqi Computer Attacks and U.S. Defense

11.       South Korean Military Cyber Command Announced

12.       As Smart Grid Expands, So Does Vulnerability to Cyber Attacks

13.       Recent Air Force Law Review Discusses Cyberlaw

14.       Taliban Out-Surging Us in Information War

15.       NK Developing Another Deadly Weapon: Hackers

16.       Secret agents fight a cyber attack on Britain every day

17.       Lessons from the Estonian cyber-attacks

18.       War From Cyberspace

19.       On the imminent Cyber Warfare, what’s Ghana’s preparedness?

Worth a Look: Nokia and Information Mapping

IO Mapping
Manuel Lima & Nokia
Manuel Lima & Nokia

After 3 years living, studying, working and teaching in NYC, Manuel moved to London where he currently works as a Senior User Experience Designer at Nokia's NextGen Software & Services. Manuel is also a frequent speaker in conferences and festivals around the world, on the topic of Information Visualization, in particular the visualization of complex networks.

Manuel Lima's Home Page
Manuel Lima's Home Page
Art (62)
Biology (50)
Business Networks (24)
Computer Systems (27)
Food Webs (7)
Internet (30)
Knowledge Networks (103)
Multi-Domain Representation (59)
Music (31)
Others (54)
Pattern Recognition (24)
Political Networks (20)
Semantic Networks (30)
Social Networks (88)
Transportation Networks (45)
World Wide Web (54)

Officers Call: A Conversation About Iraq II

02 China, 04 Inter-State Conflict, 05 Civil War, 05 Iran, 10 Security, Analysis, Ethics, IO Sense-Making, Military, Officers Call, Peace Intelligence
Officers Call on Iraq II
Officers Call on Iraq II

Sir,

There's nothing inherently wrong with the analysis of Al Qaeda (I just glanced at it, if you wish I can read in detail today).  The PROBLEM lies not so much in how we analyze support to terrorism (state, crime, other) but rather in the way we analyze (or rather do NOT analyze) EVERYTHING.

Here's what I have thrown together for you, in six pages with links.

Summary of Contents (OC Iraq II)

  • Why We Missed the Threat
  • Terrorism is Threat Number Nine Out of Ten
  • Terrorism is a Tactic, Al Qaeda an Interest Group
  • Without Legitimacy Forget About Stabilization
  • Rebalancing the Instruments of National Power
  • Three Things Secret Intelligence Cannot Do
  • Advise & Assist Transition to Exit Menu
    • Strategic Communications
    • Inter-Agency Professionals
    • Regional Concordat
    • Faith Brigades
    • Redirect Funds Toward Waging Peace
    • Contain Israel
    • Make Nice with China

Officers Call on Iraq I

Semper Fidelis,  Robert

Worth a Look: Life Cycle Assessment Made Simple

Commercial Intelligence, Earth Intelligence, IO Sense-Making, Worth A Look
Life Cycle Assessment
Life Cycle Assessment

Life Cycle Assessment (LCA) is a tool used to evaluate the potential environmental impact of a product, process or activity throughout its entire life cycle by quantifying the use of resources (“inputs” such as energy, raw materials, water) and environmental emissions (“outputs” to air, water and soil) associated with the system that is being evaluated.

LCA is Not Risk Assessment. This is because LCA does not consider exposure, which is critical for assessing risk. LCA quantifies emissions, but the actual impacts of those emissions depend on when, where and how they are released into the environment.

Continue reading “Worth a Look: Life Cycle Assessment Made Simple”

Journal: Beyond Weber to Epoch B Leadership

IO Sense-Making

Vaccaro et al
Vaccaro et al

The Next Surge: Counterbureaucracy

Full Story Online
Full Story Online

By JONATHAN J. VACCARO December 7, 2009

THE Taliban commander was back in the village. Our base roared to life as we prepared to capture him. Two Chinook helicopters spun their blades in anticipation in the dark. Fifty Afghan commandos brooded outside, pacing in the gravel. I was nearby, yelling into a phone: “Who else do we need approvals from? Another colonel? Why?

. . . . .

While the troops prepared, I spent hours on the phone trying to convince the 11 separate Afghan, American and international forces authorities who needed to sign off to agree on a plan.

Some couldn’t be found. Some liked the idea, others suggested revisions. The plan evolved. Hours passed. The cellphone in the corner rang. “Where are you?” the villager asked urgently. The Taliban commander was drinking tea, he said.

At 5 a.m. the Afghan commandos gave up on us and went home. The helicopters powered down. The sun rose. I was still on the phone trying to arrange approvals. Intelligence arrived indicating that the Taliban commander had moved on. The villagers were incredulous.

Jonathan J. Vaccaro served as an officer with the United States Army in Afghanistan from January 2009 to July 2009.

Continue reading “Journal: Beyond Weber to Epoch B Leadership”

Journal: Surveillance State Expands Part II

IO Secrets, Uncategorized
Telecomm Spy Manuals
Telecomm Spy Manuals

Phi Beta Iota: To be good at intelligence (decision-support) it is important to have a sense of balance between secret and open sources; between collection and processing; and between unilateral and multinational anaysis.  The welcome acknowledgement by the Director of National Intelligence (DNI) that we spend $75 billion a year on secret intelligence and covert action, combined with the recent release of most of the U.S. telecommunications spy manuals now posted at Cryptome, suggest that we are out of balance.  We still don't balance between secret and open source collection; we still don't have all-source processing; we still don't do multinational engagement with any depth or breadth; and we still don't provide decision-support to 95% of the federal, state, and local government clients and customers with serious needs.

See also:

Continue reading “Journal: Surveillance State Expands Part II”