29 May 2013 1000-1200 NDU DC Dr. Walter Dorn, Peacekeeping Technology for the Protection of Civilians

Advanced Cyber/IO, IO Deeds of War, Peace Intelligence
Dr. Walter Dorn
Dr. Walter Dorn

Peacekeeping Technology for the Protection of Civilians

The goal of the forum is to increase awareness of peacekeeping technologies and how they are being used in practice.  While much attention has been given to providing the UN with helicopters and unmanned aerial vehicles (UAVs), Dr. Dorn emphasizes the importance of basic tools such as smart phones, night vision goggles, video surveillance, and tethered balloons. The forum will include two panels  of experts to explore how the UN and African militaries might go about pilot projects to make use of these innovations.

Keynote Address by: Dr. Walter Dorn, Author of Keeping Watch: Monitoring Technology and Innovation in UN Peace Operations and editor of the forthcoming

Panelists Include:
Colonel Thomas Dempsey, African Center for Strategic Studies (ACSS)
Dwight Raymond, Peacekeeping and Stability Operations institute (PKSOI)
Sarah Williamson, Protect the People (PTP)
David Rogers, MobileGov
Alison Giffen, Stimson Center

Wednesday, May 29, 2013, Time: 10:00am-12:00pm
National Defense University, Lincoln Hall Room 3305, Ft. McNair, Washington, D.C.

This is a part of the TIDES Speaker Series.  Please RSVP to Nelly Mobula 202-685-1971 nelly.mobula@ndu.edu
or register online at: http://www.ndu.edu/CTNSP/Event_Registration/register.cfm

DOWNLOIAD PDF FLYER FOR LOCAL BULLETIN BOARD:
NDUMay29 PeacekeepingTechnology_29May2013

Stuart Littlewood: Holy Land Truth — Christians Waffling on Truth About Invented State of Israel + Books RECAP

06 Genocide, 07 Other Atrocities, 08 Wild Cards
Stuart Littlewood
Stuart Littlewood

Is This The Best that Christianity Can Do?

The Holy Land needs advocates for the truth. “It is the truth, and only the truth, that will lead to peace and justice”

While the Jewish State was putting its finishing touches to Operation Cast Lead (the horrific blitzkrieg launched over Christmas-New Year 2008/9 against Gaza’s civilians, including the Christian community there), the Archbishop of Canterbury, Rowan Williams, joined Chief Rabbi Jonathan Sacks in a visit to the former Nazi camps of Auschwitz-Birkenau to demonstrate their joint solidarity against the extremes of hostility and genocide.

“This is a pilgrimage… to a place of utter profanity – a place where the name of God was profaned because the image of God in human beings was abused and disfigured,” said the Archbishop. “How shall we be able to read the signs of the times, the indications that evil is gathering force once again and societies are slipping towards the same collective corruption and moral sickness that made the Shoah possible?”

Read the signs? He needed to look no further than the hell-hole that the Holy Land had been turned into by Israel’s occupation and unfettered aggression, with Britain’s blessing… and, dare one say, without too much fuss from England’s established church either.

If ever there was a place where “the name of God was profaned” the so-called Holy Land is it.

Continue reading “Stuart Littlewood: Holy Land Truth — Christians Waffling on Truth About Invented State of Israel + Books RECAP”

Jon Rappoport: Who Hacked CBS Star’s Computers? Are We All In An Information Prison?

09 Justice, 10 Security, Corruption, Government, Law Enforcement, Media
Jon Rappoport
Jon Rappoport

CBS News star hacked: the big chill

www.nomorefakenews.com

Sharyl Atkisson is the one thing CBS News has going for it. She’s the real article. As real as you can be in the current news climate, while still working for a major media outlet.  She crashed the credibility of the CDC, as it was lying through its teeth about numbers of Swine Flu cases and overplaying the fake “epidemic.”  She’s taken on the horrific effects of vaccines, to the point where her Wikipedia page, through a series of unethical maneuvers, continues to characterize her as irrationally “anti-vaccine.”  She broke key elements of Fast&Furious. She’s a hound on Benghazi, and the Obama administration’s funding of “green programs.”

Now, she states that her computer was compromised in 2011, as she was covering Fast&Furious. She’s still working to find out what happened.

From PoliticoSharyl Attkisson's computers compromised

“Sharyl Attkisson, the Emmy-award winning CBS News investigative reporter, says that her personal and work computers have been compromised and are under investigation.

“‘I can confirm that an intrusion of my computers has been under some investigation on my end for some months but I’m not prepared to make an allegation against a specific entity today as I’ve been patient and methodical about this matter,’ Attkisson told POLITICO on Tuesday. ‘I need to check with my attorney and CBS to get their recommendations on info we make public.’

“Attkisson told WPHT that irregular activity on her computer was first identified in Feb. 2011, when she was reporting on the Fast and Furious gun-walking scandal and on the Obama administration’s green energy spending, which she said ‘the administration was very sensitive about.’”

end Politico excerpt

Two computers compromised. Star reporter. Somebody gained physical access or remote access to those machines. Strong likelihood it started as a government response to Atkisson’s coverage of Fast&Furious. (Although, unfortunately, Atkisson should also look to someone at CBS as the possible hacker.)  All those nasty stories Atkisson’s worked on, over the years? If she ever wants to use sources from those pieces again, she’s going to have to convince them they won’t pay a steep price for talking to her.  Then, for future stories, she’s going to have to convince new sources they can talk to her without getting into serious trouble.

It’s the big chill. This is the government and its allies sending a message to reporters’ sources and potential sources, confidential or not: watch out; we’re listening in; we can make you sorry.

Continue reading “Jon Rappoport: Who Hacked CBS Star's Computers? Are We All In An Information Prison?”

David Swanson: US Census Identified & Catalogued “Anti-Government” Respondents

09 Justice, 10 Security, 11 Society, Ethics, Government
David Swanson
David Swanson

The Government's List of “Anti-Government” People

Should the U.S. government be building a list of people whom a stranger has concluded based on as little as a moment's interaction are “anti-government”?  Look at this photo of a U.S. Census laptop.  There's a box to check if a respondent is reluctant to participate in the census.

Click on Image to Enlarge
Click on Image to Enlarge

The next screen wants the census interviewer to explain the potential interviewee's reluctance:

Click on Image to Enlarge
Click on Image to Enlarge

Notice that there is a box for hostile or threatening.  That seems important.  There are boxes for just not interested or too busy.  There is a box for those who object that too many personal questions are asked.  The basics all seem to be covered.  But the Census employee is to check multiple boxes, “all that apply,” and one is  “Anti-government concerns.”  What does that mean?  What do Census workers think it means?  It clearly means something other than reluctant to give the government this information.  To be “anti-” the government sounds like someone is in favor of overthrowing the government.  And a government that thinks purely in terms of violence would inevitably interpret such a desire as one in favor of violently overthrowing the government.  But surely nobody tells a representative of the government that they favor its violent overthrow unless they don't really take themselves seriously and are not actually a threat.  So maybe this “Anti-government concerns” box is equivalent to “Seems nuts,” but what sort of training does the survey taker have in mental health?  The serious question is what lists your name goes on if somebody marks you down as Anti-government.

Stephen E. Arnold: Search and Business Intelligence “Merge” But Nothing New — with Comment by Robert Steele

#OSE Open Source Everything, Collective Intelligence, Cultural Intelligence, Earth Intelligence, Peace Intelligence
Stephen E. Arnold
Stephen E. Arnold

Are Search and Business Intelligence Merging?

Wrong tense. Search has been sucked into business intelligence as a subordinate or utility function.

Consultants and “experts” suggest that search and business intelligence are converging. Information Builders, based in New York City, suggests that the alleged convergence looks like two equally-sized markets merging like a math book’s illustration of a Venn diagram. The picture is symmetrical and appears to make sense. In my opinion, the presentation of “worlds’ merging” in an orderly manner is misleading at best and downright silly at worst.

. . . . . . . .

In the somewhat untidy worlds of search and business intelligence, not much has changed. Terminology and the fervent belief that new phrases will solve information problems is more important than tackling more fundamental, less zippy issues.

We have entered an era of same old, same old, and there is no turning back. The problem of computational limits force systems to work as they have for many years. The methods and the math is the same. The content types and the marketing lingo are different.

Continue reading “Stephen E. Arnold: Search and Business Intelligence “Merge” But Nothing New — with Comment by Robert Steele”

Stephen E. Arnold: Potentially New Web Page Data Mining Tool

Advanced Cyber/IO
Stephen E. Arnold
Stephen E. Arnold

Potentially New Web Page Data Mining Tool

Extracting content from a Web page can be a maddening process, requiring specialized scripts and time spent coding them. Taking a look at available tools, Softpedia touts “FMiner Pro 7.05.” FMiner Pro is advertised as a reliable application that allows users to easily handle Web content without scripts. The software can pull data from any page type, including https, plugins, JavaScript, and even complete data structures.

After the data is extracted much can be done with it:

“Extracted results can be saved to csv, Excel(xls), SQLite, Access, SQL Server, MySQL, PostgreSQL, and can specify the database fields’ types and attributes(eg, UNIQUE can avoid duplication of the extracted data). According to the setting, program can build, rebuild or load the database structure, and save the data to an existing database. Professional edition support incremental extraction, clear extraction and schedule extraction.”

 

FMiner Pro is available for a free fifteen-day trial to see how well it can perform. After viewing the specs, FMiner Pro is worth a shot. It can probably save coders hours by not having to write scripts and organizing Web content is a tedious job no one likes to do. Having a program to do it is much more preferable.

Whitney Grace, May 22, 2013

Sponsored by ArnoldIT.com, developer of Beyond Search

4th Media: Assad Interview — West Fueling Violence; Isaraeli Jeep Invades Syria & Destroyed; Russia Engaged

04 Inter-State Conflict, 05 Civil War, 06 Russia, 08 Wild Cards
Click on Image to Enlarge
Click on Image to Enlarge

President Assad: “I’m HERE TO STAY!”

West fueling violence without regard to cost.

Israeli Army Enters Syria & Supports the Pentagon-Trained Al Nusra Merceneries

All of one Israeli jeep destoryed by Syrian artillery fire in Security Zone.

Russia Sends at Least 12 Warships to Syria: A Warning to Israeli/US against Military Intervention in Syria

And there are the Russian specialists manning the Russian anti-air and anti-ship missiles now owned by Syria.

noble gold