Yoda: End of Servers III – BitTorrent Maelstrom — Open Power Beginning to Rock!

Advanced Cyber/IO, Civil Society, Ethics
Got Crowd? BE the Force!
Got Crowd? BE the Force!

BitTorrent Tests Websites Hosted in the Crowd, Not the Cloud

An experimental browser shows how peer-to-peer technology can serve up entire websites, not just individual files.

An experimental new Web browser makes it possible for sites to be hosted not on a company’s servers but, instead, by a shifting crowd of individuals on their personal computers. That turns the usual approach to serving up websites on its head and could provide a more effective and reliable way to disseminate bulky media files or distribute vital information in the event of natural disaster.

Continue reading “Yoda: End of Servers III – BitTorrent Maelstrom — Open Power Beginning to Rock!”

Michael Flynn: Obama Delusional, CIA Unprofessional [PBI: and USDI a Waste]

Corruption, Government, Ineptitude, Military
Michael Flynn
Michael Flynn

Former Defense Intel Chief Blasts Obama

Lt. General Michael Flynn, former head of the Defense Intelligence Agency, blasted the Obama administration’s approach to the War on Terror in a hard-hitting speech to a meeting of intelligence professionals. “The dangers to the U.S. do not arise from the arrogance of American power, but from unpreparedness or an excessive unwillingness to fight when fighting is necessary,” Flynn said, in an unsparing critique first reported by the Daily Beast.

Continue reading “Michael Flynn: Obama Delusional, CIA Unprofessional [PBI: and USDI a Waste]”

Anthony Judge: Eliciting “Us versus Them” Insights from US Covert Operations Against Global Governance

Cultural Intelligence
Anthony Judge
Anthony Judge

Eliciting Insight from Covert Operations by US

Understanding global governance otherwise in response to THEM

Introduction
US: Universal Synthesizer or Universal Sympathizer?
THEM: Terrifying Hypothetical External Mentalities?
THEM as the “borgification” of US
Covert operations by US in response to THEM
Eliciting insight from covert “usification”
References

Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy

Advanced Cyber/IO, Cultural Intelligence, Ethics, Government, IO Impotency
Martin Petersen
Martin Petersen

What I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers

Martin Petersen, Studies in Intelligence, 2011

PDF (8 Pages): Petersen-What I Learned-20Apr2011

Policymakers do not always see how we can help them.

Continue reading “Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy”

Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele

Advanced Cyber/IO, IO Impotency
Click on Image to Enlarge
Click on Image to Enlarge

An Arnold IT CORE Report for Law Enforcement, Security and Intelligence Professionals and Organizations

This monograph has a single goal: Provide a Contracting Officer (CO) or Contracting Officer's Technical Representative (COTR) — or the end-user engaged in investigatory work, military operations, and intelligence activities — with a collection of technology capability summaries about companies building next-generation tools…critical insights that could save millions in mis-placed capitalization.

“CyberOSINT is the first discussion of the innovative software that makes sense of the flood of open source digital information. Law enforcement, security, and intelligence professionals will find this an invaluable resource to identify automated ways to deal with Big Data.”

– Dr. Jerry Lucas, President, Telestrategies ISS

Table of Contents with topics covered and companies profiled below the line along with full-text of the Foreword by Robert Steele and Preface by Stephen Arnold.

Continue reading “Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele”

2015 Robert Steele – Foreword to Stephen E. Arnold’s CyberOSINT: Next Generation Information Access

Advanced Cyber/IO, IO Impotency, Software
Robert David Steele Vivas
Robert David Steele Vivas

Stephen E. Arnold, CyberOSINT: Next Generation Information Access (Harrods Creek, KY: Arnold Information Technology, 2015)

Memorable URL: http://tinyurl.com/Steele-CyberOSINT

Foreword

By Robert David Steele

In 1986, I was selected from the CIA’s clandestine service to help lead a pilot project to bring the CIA into the 21st Century. From that moment almost 30 years ago, I have been obsessed with open sources of information in all languages, mediums, and computer-aided tools for analysis—everything the
CIA does not utilize today. I took my cue in the mid-1980s from author Howard Rheingold,0 who explored how computers could be used to amplify human thought and communication, and the CIA Directorate of Intelligence team of Diane Webb and Dennis McCormick.1

Continue reading “2015 Robert Steele – Foreword to Stephen E. Arnold's CyberOSINT: Next Generation Information Access”

Sepp Hasslberger: Text When Grid Crashes

Access, Advanced Cyber/IO
Sepp Hasslberger
Sepp Hasslberger

This Handy Device Will Let You Send Text Messages Even After The Grid Crashes

Communicate without the need for any central connectivity — no Wi-Fi, cell towers or satellites needed. The gadget uses long-range radio waves — between 151-154 MHz — to send messages to other goTenna devices within its range. Depending on the surrounding terrain and elevation, the device can send messages up to 50 miles away. In the city, the range shrinks to roughly 1 mile.

noble gold