Journal: William Polk AF Trip Report August 2010

08 Wild Cards, Officers Call
Chuck Spinney Recommends

The attached trip report documents William R. Polk's impressions of the current situation in Afghanistan based on interviews and discussions he had over a period of 10 days in August.  Polk, a highly experienced American diplomat, foreign policy specialist, as well as a being a highly-regarded scholar, is the author of Violent Politics: A History of Insurgency, Terrorism, and Guerrilla War, from the American Revolution to Iraq, which is one of the very best books I have ever read on the subject of guerrilla warfare.

This very informative albeit long document covers a variety of viewpoints, each of which merits careful reading.  I found the recapitulation of his discussions with Russian Ambassador Andrey Avetisyan and Mullah Abdul Salam, a former high ranking member to the Taliban, to be particularly interesting and important.

Chuck Spinney
Polk AF Trip Report Aug 2010

Phi Beta Iota: We read every word.  Talk about deja vu.  Everywhere we have ever been, the exaggeration of security and force protection, along with the absence of responsible informed strategy, leaves the Americans both out of touch with reality, and ineffective at waging peace.

Journal: Pentagon Flails in Defending Cyberspace

03 Economy, 04 Education, 10 Security, 11 Society, Corruption, IO Multinational, IO Secrets, Military, Officers Call
Marcus Aurelius Recommends

Beyond belief, but here it is: the “official” explanation of why we are going to waste 12 billion dollars a year on contractors without a clue (vapor-ware).   There is zero return on investment here for the taxpayer, only for the contractors and Congress, neither of which will be held accountable for fraud, waste, and abuse.

See Also:

2010: OPINION–America’s Cyber Scam
2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise
2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid
Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101
Journal: Pentagon’s Joint Strike Fighter (JSF) as a Metaphor for a Predictable Defense Meltdown


ESSAY

Defending a New Domain

The Pentagon's Cyberstrategy

William J. Lynn III
WILLIAM J. LYNN III is U.S. Deputy Secretary of Defense.

In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. The flash drive's malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.

Read Entire Article Below the Line.

Continue reading “Journal: Pentagon Flails in Defending Cyberspace”

Journal: DoD, WikiLeaks, JCS, Security Ad Naseum…

07 Other Atrocities, Civil Society, Corruption, Ethics, Government, InfoOps (IO), Intelligence (government), IO Impotency, Journalism/Free-Press/Censorship, Media, Methods & Process, Military, Officers Call, Secrecy & Politics of Secrecy

Defense News August 23, 2010

Experts: DoD Could Have Prevented WikiLeaks Leak

By William Matthews

While senior Pentagon officials resort to bluster in hopes of preventing the WikiLeaks website from posting any more secret Afghan war documents on the Internet, security experts say there is a lot the U.S. military could have done to prevent the classified documents from being leaked in the first place.

Steps range from the sophisticated — installing automated monitoring systems on classified networks — to the mundane — disabling CD burners and USB ports on network computers.

“The technology is available” to protect highly sensitive information, said Tom Conway, director of federal business development at computer security giant McAfee. “The Defense Department doesn’t have it, but it is commercially available. We’ve got some major commercial clients using it.”

Full Article Below the Line (Not Easily Available on Internet); Lengthy Comment Follows Article

Continue reading “Journal: DoD, WikiLeaks, JCS, Security Ad Naseum…”

Worth a Look: CrowdMap (Beta)

Advanced Cyber/IO, Analysis, Augmented Reality, Citizen-Centered, Collective Intelligence, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Earth Intelligence, Geospatial, Historic Contributions, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, IO Mapping, Journalism/Free-Press/Censorship, Maps, Methods & Process, microfinancing, Mobile, Officers Call, Open Government, Policy, Reform, Research resources, Technologies, Tools, Worth A Look

Crowdmap (Liquida)

Crowdmap allows you to…

+ Collect information from cell phones, news and the web.
+ Aggregate that information into a single platform.
+ Visualize it on a map and timeline.

Crowdmap is designed and built by the people behind Ushahidi, a platform that was originally built to crowdsource crisis information. As the platform has evolved, so have its uses. Crowdmap allows you to set up your own deployment of Ushahidi without having to install it on your own web server.

See Also:

Graphics: Twitter as an Intelligence Tool

Reference: How to Use Twitter to Build Intelligence

Journal: Tech ‘has changed foreign policy’

Continue reading “Worth a Look: CrowdMap (Beta)”

Journal: General McCrystal Wins, US Troops Lose

08 Wild Cards, Government, Military, Officers Call
Marcus Aurelius Recommends

New York Daily News
August 17, 2010
Pg. 18

Fired McChrystal Gets Yale Grad School Gig

WASHINGTON — Retired Army Gen. Stanley McChrystal, the too-outspoken Afghan commander sacked by President Obama, picked up a consolation prize yesterday from the Ivy League.

Yale announced McChrystal would teach a “ leadership seminar” for grad students. McChrystal said he was looking forward to “ sharing my experiences and insights as a career military officer.”

McChrystal, 56, was forced into retirement in June after dissing the chain of command in a Rolling Stone interview.

FULL STORY ONLINE

Continue reading “Journal: General McCrystal Wins, US Troops Lose”

Journal: Traitor to Some, Hero to Others

10 Security, 11 Society, InfoOps (IO), Journalism/Free-Press/Censorship, Officers Call, Open Government, Secrecy & Politics of Secrecy
Marcus Aurelius Recommends

(COMMENT:  Really too bad that individuals like this are entitled to Constitutional protections…  If he in fact compromised assets, as I have read in open press, they will be lucky if all the Taliban does is shoot them.)

Washington Post
August 14, 2010
Pg. 2

Army Analyst Celebrated As Antiwar Hero

Many rally to soldier's defense after disclosure of classified documents

By Michael W. Savage

For antiwar campaigners from Seattle to Iceland, a new name has become a byword for anti-establishment heroism: Army Pfc. Bradley E. Manning.

Manning, a 22-year-old intelligence analyst, is suspected of leaking thousands of classified documents about the Afghanistan war to the Web site WikiLeaks.

FULL STORY ONLINE

Phi Beta Iota: This needs to be evaluated at multiple levels.

Continue reading “Journal: Traitor to Some, Hero to Others”

Search: “the central problem of our time” Steele

About the Idea, Officers Call, Searches

Journal: Politics & Intelligence–Partners Only When Integrity is Central to Both

Robert Steele as posted 13 October 2009.  The below paragraph is cited in Kent C. Myers, Reflexive Practice: Professional Thinking for a Turbulent World (New York, NY: Palgrave McMillan, 2010); p. 86.

The central problem of our time is the failure of human organization–its failure to scale, to adapt, to assimilate.

We believe the failure stems directly from a rejection of diversity and a falsification of feedback loops–the absence of integrity.

We’ve come to the conclusion that the discord between politics and intelligence is contrived–there is no inherent opposition between politics (choice of best path for all) and intelligence (presentation of best achievable truth for all) provided ONE condition is met: integrity among the majority of individuals engaged in each.

If intelligence loses its integrity and allows itself to be politicized or worse, ignored, then intelligence fails.  Similarly, if politics loses its integrity and overplays the secrecy card while also shutting out the diversity of views that are essential to achieving a sustainable consensus, then politics fails.

See Also:

About the Idea: Dr. Kent Myers Dissects Intelligence Reformer Robert Steele