Journal: Running Interference On Interference

08 Wild Cards, Military, Mobile
Full Story Online
Full Story Online

Running Interference On Interference

December 9, 2009: The U.S. Army, which operates thousands of UAVs (over 90 percent of them the five pound Raven, which gives each company commander his own recon aircraft), has found more and more of them suffering from electronic interference. This problem is expected to get worse, especially as the army introduces dozens of Sky Warriors (a cousin to the air force Predator) over the next year or so. The larger UAVs have a lot more going on inside them, and a lot more electronic commands coming to the aircraft. The air force has noted an increase in electronic interference in its growing fleet of Predators and Reapers. Some air force officers believe the enemy is trying to electronically jam the command signals, or electronics on board the UAVs. But electronics experts believe it's just the greater number electronic signals in the air, even in rural Afghanistan. Nevertheless, better encryption is being used for the control signals going to and from U.S. UAVs.

Phi Beta Iota: Tip of the hat to Strategy Page.  Over 30 years ago it was known that Soviet emission standards were ten times tougher than ours.  Today we not only do not have emission standards to speak of, but we use open commercial communicaitons satellites and we do not worry about having all our Supervisory Control and Data Acquisition (SCADA) systems online.  The U.S. Government appears to be completely oblivious to basic realities.

Journal: Dumb Crowd Sourcing–Good Start

Collaboration Zones, Communities of Practice, Key Players, Methods & Process, Mobile, Policies, Real Time, Threats
Full Story and Video Online
Full Story and Video Online

Pyramid scheme lets audience vote for climate solutions

A worldwide audience will decide the planet's fate in game-show format during the Copenhagen climate summit by suggesting and voting on climate solutions and how they will be funded.

Phi Beta Iota: This is exactly the right idea in the wrong venue with the wrong frame of reference.   We love it, it is a good start.  What they should be doing is creating a Global Range of Need Table that spans all ten high level threats to humanity, across all twelve core policy areas, with preference given to the eight major humanities.  See  Strategic Analytic Model and also Earth Intelligence Network.  Below is the two-pager circulating in United Nations and BRIC circles.

UN World Brain Institute and Global Game Talking Points (2 pages)

Journal: Citizen Cyber-Detectives on the March

10 Security, 10 Transnational Crime, 11 Society, Civil Society, Collective Intelligence, Law Enforcement, Methods & Process, Mobile, Peace Intelligence, Real Time

Video 9:40 Min
Video 9:40 Min

The Internet Detective – Switzerland

There is a new breed of super-sleuth emerging in the virtual world of the web. For both petty criminals and major terrorist groups, internet detectives are fast becoming a force to be reckoned with.  Making it his business to track down criminal activity through the web, Guido Rudolphi, the Sherlock Holmes of the cyber world, considers himself a legal hacker. “So much more information can be accessed, quite legally, than the individual user would ever imagine.” Rudolphi has taken advantage of this new free-flow of online information to catch paedophiles, fraudsters, and even unearth international cells of Al-Quaeda. He demonstrates how it takes less than twenty minutes to establish a persons credentials, locate them and hand them over to the police. “People seem to think theyre anonymous online, that nothing can happen to them there thats very naive.”

Worth a Look: MicroPlace Giving to the Poor

11 Society, Civil Society, Commerce, Gift Intelligence, Key Players, Methods & Process, Mobile, Non-Governmental, Peace Intelligence, Real Time, Threats
MicroPlace Giving to Poor
MicroPlace for Poor

Level of poverty

Financial  My financial return 1% – 3% | 4% – 6%

When I get repaid Anytime | < 1 yr | 1 – 3 yrs | > 3 yrs

My money is going to Single institution | Multiple institutions

Support small coffee growers in the mountains of Nicaragua

Support Fair Trade Coffee Farmers in Tanzania

Phi Beta Iota: Evidently an EBay initative with a PayPal front end, this impresses us.  Subject to audit, it is precisely what we were thinking of (see our Denmark Briefing) as a means of connecting the one billion rich (80% of whom do not give to charity now) with the five billion poor at the household item level of need.  The major FLAW with with implementation is that it relies on intermediaries that will suck off 50% or more of the actual value.  Still needed: the Global Range of Needs Table. This would also benefit from a Twitter application and a near real time “close by can do easy” option.

Journal: Surveillance State Expands

10 Security, Government, Law Enforcement, Mobile, Real Time
Marcus Aurelius
Marcus Aurelius

Amidst reports that the Department of Homeland Security is adding 30,000 positions, below are two items on the continued expansion of the surveillance state.

Sprint Provided 8 Million Reports on Customers to Law Enforcement

Yahoo, Verizon: Our Spy Capabilities Would ‘Shock’, ‘Confuse’ Consumers

EFF sues feds for info on social-network surveillance

Continue reading “Journal: Surveillance State Expands”

Journal: Public Search of Cell and Radio

Civil Society, Collective Intelligence, Methods & Process, Mobile, Real Time
Public Access to Cell & Radio
Public Access to Cell & Radio

We anticipate all text messages being available for public search in the near term, joining our observation that Twitter is now a crowd-sourcing as well as a point of presence intelligence tool.

Click on the collage to search text messages from 9-11–the scope is believed to be limited (e.g. NYC only) but this is a harbinger of things to come.

The Hacktivists are working on running all radio communications among the fire and police in NYC into the CISCO digitzer, and then making that searchable.  Unlike the result in seaching for bomb or bombs in text messages, we anticipate that the radio traffic will blow people's mind, especially when visualized.

Thus does the public recapture its power–by paying attention.  Thomas Jefferson and James Madison would be proud….and this might be a good point at which to observe that Thomas Jefferson was himself one of the first American counter-culture icons, see  Counterculture Through the Ages: From Abraham to Acid House.

2001-09-11 10:04:09 Metrocall [1261437] ALPHA Anotherbomb/explosion under the world trade h
2001-09-11 10:04:54 Skytel [003927743] ALPHA litha.Chittapragada@gs.com|RE:Please call me. I am in my office| NYSE is also bombed. I am leaving the building. I am with HARI. Pray me.

Reference: Are Hackers Pioneers with the Right Stuff or Criminal Pathological Scum? Mitch Kabay Reprises

03 Economy, 04 Education, 10 Transnational Crime, Civil Society, Collective Intelligence, Ethics, Hacking, ICT-IT, InfoOps (IO), Law Enforcement, Media Reports, Methods & Process, Mobile, Real Time, Technologies

Full Story Online
Full Story Online

Why Criminal Hackers Must Not Be Rewarded
Part 1: The Fruit of the Poisoned Tree

By M. E. Kabay, 11/30/2009

In 1995, I participated in a debate with distinguished security expert Robert D. Steele, a vigorous proponent of open-source intelligence. We discussed the advisability of hiring criminal hackers. Perhaps readers will find the polemic I published back then of interest today. I’m sure it will provoke vitriolic comments from the criminal hacker community.

Continue reading “Reference: Are Hackers Pioneers with the Right Stuff or Criminal Pathological Scum? Mitch Kabay Reprises”

noble gold