Reference: Truth & Nuance as an Information Operations (IO) Mission

Analysis, Articles & Chapters, Collaboration Zones, Communities of Practice, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), Intelligence (government), IO Sense-Making, Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Officers Call, Open Government, Policies, Power Behind-the-Scenes/Special Interests, Real Time, Secrecy & Politics of Secrecy, Strategy, Threats
Kelley Vlahos

Aldous Huxley Would Be Proud

by Kelley B. Vlahos, December 14, 2010

EXTRACT:  British novelist Aldous Huxley was a social critic and futurist, who is best known for penning Brave New World, which, aside from being a nearly 80-year-old science fiction masterpiece, is both an allegory and prophecy for 21st Century western society.

Huxley’s finger was on the pulse of human freedom, and he warned us over 50 years ago that it was fading fast. In 1958, he predicted that when concentrated in the hands of the “Power Elite,” rapidly evolving “mass communication” like television would be a critical tool of social and political conformity. Technology is only the medium, and it is “neither good nor bad,” Huxley wrote, but when in the wrong hands it can be “among the most powerful weapons in the dictator’s armory.” Propaganda, the suppression of the truth, particularly in democratic societies, Huxley argued, would bring upon an age of human enslavement, where instead of yokes and chains, people in celebrated “free” societies like America would be bound by the soft restraints of ignorance, incuriousness, distraction and irrationality.

. . . . . . .

EXTRACT:  In his 1958 interview with Mike Wallace, Huxley explained his concept of velvet totalitarianism:

“’If you want to preserve your power indefinitely, you must get the consent of the ruled,’ he said. Those in power will do this primarily through ‘techniques of propaganda,’ by ‘bypassing the rational side of man and appealing to his subconscious and deeper emotions’ and ‘making him love his slavery.’”

I would submit that Mr. David Brooks loves his slavery, and furthermore, is the perfect “alpha caste” prototype from Brave New World – he uses the good brains God (Ford) gave him to reflexively sustain the status quo, barking and nipping like a loyal lapdog when something or someone threatens it. The same goes for the rest of the so-called journalistic elite who have taken to the Net and on the television to discredit Assange in recent days, either through bald ad hominem or discrediting his work as “not journalism,” or “criminal.” Proto-elite scrambling among the herd of pundits across the mediascape are the worst, feeling they have to be more red-faced and extravagant in their commentary in order to stand out.

. . . . . . .

EXTRACT:  They aren’t even necessarily things we shouldn’t be reading or have some level of access to. Officials and journalists of every ilk spent the better part of this decade bemoaning the “over classification” of government information before, and especially after, 9/11. When pouring over the reams of information for the 9/11 Commission, former New Jersey Gov. Thomas Kean, who was chairing the commission said, “Three-quarters of what I read that was classified shouldn’t have been.”

Read this entire brilliant piece being categorized as a Historic Contribution.

Phi Beta Iota: Since starting this fight in 1988, the single most valuable body of knowledge we have acquired over those 22 years has been our little black book of great minds that speak the truth across all functional domains.  Kelley Vlahos is married to Michael Vlahos, and they are two of the most nuanced thinkers we know.  The era of secrecy and top-down micro-management for the benefit of the few is over.  It will not be replaced by communism or anarchy, it will be replaced by moral communitarian capitalism and panarchy.  It will focus–as we should have been focused since the end of World War II–on the needs and gifts of the five billion poor who can create infinite wealth, especially when we achieve infinite free energy by turning away from the corruption associated with the scarcity of fossil fuels, and instead tap into the free cosmic energy that Buckminster Fuller addressed so ably.  INTEGRITY IS BACK IN VOGUE.  That's a good thing.

Reference: Logistics Oversight as an Information Operations (IO) Mission

Articles & Chapters, Computer/online security, Cultural Intelligence, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Methods & Process, Military, Officers Call, Peace Intelligence, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Threats

David IsenbergDavid Isenberg

Posted: December 21, 2010 11:59 PM

Huffington Post

Can't Anyone at DoD Do Oversight? Anyone at All?

The perennial issue regarding private military security contractors is the degree to which they are subject to effective oversight. In that regard there is only one item in today's news worth looking at. That is the report issued by the House Subcommittee on National Security and Foreign Affairs, chaired by John F. Tierney (D-MA). The Majority staff report is titled, Mystery at Manas: Strategic Blind Spots in the Department of Defense's Fuel Contracts in Kyrgyzstan. The report culminates an eight-month investigation into the Department of Defense's multi-billion dollar aviation fuel contracts at the Manas Transit Center in Kyrgyzstan.

Reminding one of the famous line by 1st Lieutenant Milo Minderbinder in Joseph Heller's famous Catch-22 novel, “We're gonna come out of this war rich!” the report found that to keep U.S. warplanes flying over Afghanistan, the Pentagon allowed a “secrecy obsessed” business group to supply jet fuel to a U.S. air base in Kyrgyzstan, turning a blind eye to an elaborate fraud involving fuel deliveries from Russia.

. . . . . . .

But the fuel was being bought by the Pentagon for shipment to the American airbase in Manas, Kyrgyzstan, and from there on to Afghanistan, the report said. Once Russian officials discovered the true identity of the recipient, they cut off supplies, creating a major logistical headache for United States military commanders.

That breakdown forced a major redrawing of supply routes into Afghanistan for jet fuel, which is in chronically short supply in landlocked Afghanistan. It also touched off a major behind-the-scenes diplomatic effort by the Obama administration to rebuild the fuel lines.

Read the complete very well-presented and documented article….

Phi Beta Iota: David Isenberg, author of Shadow Force: Private Security Contractors in Iraq, has become a valuable oversight contributor with respect to the out-of-control acquisition system on top of the out-of-control Private Military Contractor (PMC) system.  When reliability and redundancy matter, any military force that does not understand its supply chain timelines, costs, and geospatial realities down to the RFID level, as well as the vulnerabilities to disruption, is begging for a major hit.  The Information Operations (IO) domain appears poised for a major advance, integrating intelligence, logistics, operations, and civil affairs information in a manner never before attempted–with the supplemental value of placing Human Intelligence (HUMINT) in proper relationship to Cyber-Security, i.e. 70-30 or thereabouts (some would say 80-20).  Make this multinational, and it will be a game changer.  This is one reason the Office of the Inspector-General is one of the fifteen slices of HUMINT that must be managed by IO.

See Also:

Continue reading “Reference: Logistics Oversight as an Information Operations (IO) Mission”

2011 Top 10 Cyber Predictions (and Then Some)

Collaboration Zones, Communities of Practice, Computer/online security, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, IO Sense-Making, IO Technologies, Key Players, Methods & Process, Mobile, Officers Call, Policies, Real Time, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats

2011 Top 10 Cyber Predictions

Posted by Anup Ghosh on December 16, 2010

Everybody is putting out their Top 10 lists of predictions for 2011. Not to be left out of the party, below is a list of what we expect to see in 2011 in Cyber Security.

1.  Malware.

2.  Blame the User.

3.  Reactive approaches to security will continue to fail.

4.  Major Breaches in Sectors with Intellectual Property.

5.  Hacktivists will bask in their new-found glory.

6.  Critical Infrastructure Attacks.

7.  Hello Android.

8.  Windows Kernel Exploits.

9.  Organized Crime rises.

10.  Congress will rear its head.

Read full paragraph that goes with each of the above….

Phi Beta Iota: Nothing wrong with any of the above, except that they are out of context.  As the still-valid cyber-threat slide created by Mitch Kabay in the 1990's shows, 70% of our losses have nothing to do with disgruntled or dishonest insiders, or external attacks including viruses.  Cyber has not been defined, in part because the Human Intelligence crowd does not compute circuits, and the circuit crowd do not computer human intelligence.  We are at the very beginning of a startling renaissance in cyber/Information Operations (IO) in which–we predict–existing and near-term hardware and software vulnerabilities will be less than 30% of the problem.  Getting analog Cold War leaders into new mind-sets, and educating all hands toward sharing rather than hoarding, toward multinational rather than unilateral, will be key aspects of our progress.  Cyber is life, life is cyber–it's all connected.  Stove-piped “solutions” make it worse.

See Also:

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Journal: 1 in 4 Fail US Army Extrance Exam

Journal: Development at Gunpoint? Wasteful & Wrong

Undersea Cables: The Achilles Heel of our Economies

Journal: NSA Assumes It Has Been Compromised…Correct!

Reference: Frog 6 Guidance 2010-2020

Journal: Development at Gunpoint? Wasteful & Wrong

Corruption, Cultural Intelligence, Gift Intelligence, Government, Methods & Process, Military, Non-Governmental, Officers Call, Peace Intelligence, Threats
DefDog Recommends...

Development at Gunpoint?

Why Civilians Must Reclaim Stabilization Aid

Michael Young

Foreign Affairs, December 19, 2010

Summary: Today, billions of dollars in aid is delivered by soldiers and private contractors at the behest of the political and military leadership. But this so-called “militarized aid” is ineffective, wasteful, and puts lives at risk.

MICHAEL YOUNG is Regional Director for Asia, Caucasus, and the Middle East at the International Rescue Committee. He has worked in Afghanistan, Bosnia and Herzegovina, Chechnya, and Pakistan.

Article online….

Reference: Frog 6 Guidance 2010-2020

About the Idea, Collaboration Zones, Communities of Practice, Ethics, IO Multinational, IO Sense-Making, Key Players, Methods & Process, Officers Call, Policies, Strategy, Threats

2010-12-21-FrogTransparent.JPG

From Virtual Secretary of Defense

Purpose

The purpose of this memorandum is to establish priorities for my strategic objectives through 2012 and pending the concurrence of a new president with a proper staff, 2020. There is no such thing as strategic guidance for one year. This document informs without directing anyone.

Intent

My intent is to establish a baseline of truth–the truth at any cost reduces all other costs–so as to return our Armed Forces to a condition of readiness, responsiveness, and effectiveness in the face of all threats to the Republic, both domestic and foreign. At a minimum this means an Air Force capable of long-haul lift; a Navy capable of distributed littoral operations; an Army able to fight uncomfortable wars while also reinforcing legitimate governments and where appropriate helping insurgents holding the moral high ground to displace despotic regimes. It also means a Marine Corps able to put air-land-sea forces on any spot in 24 hours (platoon landing team), 48 hours (company landing team) and 72 hours (battalion landing team), along with a Coast Guard able to fulfill all of its homeland safety and security missions. Underlying my intent for the Armed Forces is a strategic intent to demand clarity, integrity, and sensibility from the Whole of Government–sustainable legal orders consonant with our public's culture.

Our blood must only be shed when our brains are engaged and all other means–cultural, diplomatic, economic, educational, and political–cannot achieve the objectives that are open, legal, ethical, moral, and validated by both Congress and the public. My intent therefore consists of creating the conditions for getting a grip on reality and being able to deal with reality, with a particular emphasis on assuring that all information necessary to inter-agency effectiveness and multinational engagement is both known to us, and shareable with others.

Continue reading “Reference: Frog 6 Guidance 2010-2020”

Reference: Private Military Corporations–A Non-State Actor-Nuclear Terror Nexus?

03 Economy, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Commerce, Corruption, Military, Officers Call, Peace Intelligence
Full Paper Online
Private Military Corporations: A Non-State Actor-Nuclear Terror Nexus?

Robert L. Brown
Temple University

August 16, 2010

Abstract:

The risk of nuclear terrorism is hyped by some as possible and high consequence (Allison 2006) while others dismiss the strategy as too difficult and too risky for terrorist organizations (Jenkins 2008). However, analysts have no data from which to directly analyze the probability of terrorist acquisition and use. One methodological solution is to extend the range analysis to include analogous cases: private military corporations (PMCs) are one class of non-state actors (NSAs) who may possess the capacity and autonomy to pose a risk of nuclear terrorism for their state masters. I find that the while the technical and military capabilities of PMCs may be greater than those of terrorist organizations with respect to nuclear weapon construction or delivery, they are still be insufficient (and PMCs must also somehow acquire fissile materials). Also, PMCs benefit from agency slack, as demonstrated by Blackwater’s performance in Iraq, but this autonomy does not appear sufficient to carry out an illicit nuclear plot. Therefore, PMCs may be more capable than most terrorist organizations if they sought to acquire nuclear weapons but they are still unlikely to succeed.

Keywords: Nuclear Weapons, Terrorism, Private Military Corporations, Blackwater, Xe

Working Paper Series
Brown, Robert L., Private Military Corporations: A Non-State Actor-Nuclear Terror Nexus? (August 16, 2010). Available at SSRN: http://ssrn.com/abstract=1659785

See Also:

David Isenberg, Jack Bauer Beats Blackwater, Huffington Post 20 december 2010

Journal: Near-Term Demise of Private Military Contractors

Wikileaks V Rolling Update CLOSED

02 Diplomacy, Corruption, Cultural Intelligence, Government, IO Multinational, IO Secrets, Officers Call
Yvette Carnell

30 December 2010

Cyber-sabotage and espionage top 2011 security fears (BBC)

The WikiLeaks War on America (Commentary)

The Dark Side of Wikileaks (Atlanta Post)

Assange: I'll reveal info that will spark Arab world coups (YNETNews)

Assange: Many Arab Officials Work With CIA (CBSNews)

WikiLeaks founder vows to release all files in case of death or incarceration (The Star)

Floyd Abrams Whizzes on WikiLeaks (Slate)

Wired journalists deny cover-up over WikiLeaks boss and accused US soldier (Guardian)

53 letters: Response to Wired's accusations (Salon)

FBI Raids Texas Server Farm for Clues to Anonymous Group, Operation Payback (eweek)

If Wikileaks Is About Cyberwar, Was The Pentagon Papers About A Wood Pulp War? (techdirt)

Continue reading “Wikileaks V Rolling Update CLOSED”