Tom Atlee Proposes distributed-intelligence, crowd-sourcing participatory think tank for popular common-sense policies, unhindered by party affiliations and ideology

Collaboration Zones, Collective Intelligence, Communities of Practice, IO Sense-Making, Mobile, Policies, Threats
Tom Atlee at Phi Beta Iota

Phi Beta Iota: There is no other person we hold in higher esteem than Tom Atlee.  For America the Beautiful, at least, he is this generation's Wise Man.  Below in his own words.  We urge one and all to contribute to his sustenance.

. . . . . . . . . . . . . . . . . . . . . . . . . .

Dear friends,

I have been talking a lot lately with strategists in the Coffee Party movement (CPM).  If you don't know much about the Coffee Party, I urge you to check out their website and Wikipedia's well-referenced short article on them.

While the Coffee Party has definite progressive roots, it also features bright transpartisan energies.  Most Coffee Party members — and co-founder Annabel Park — promote civil dialogue about public issues.  They also promote democracy-building policies, especially ones to address the democracy-degrading influence of money in politics.

I much prefer the Coffee Party's brand of transpartisanship to the more recent No Labels movement whose goal is “to encourage politicians to come together to develop pragmatic and workable solutions.”  Politicians?  What about We, the People? What about citizen deliberations and stakeholder dialogues?  I can't help but wonder what informed citizen deliberative councils would have to say about the issues the No Labels site addresses…

Although I'm still open to evidence to the contrary, it seems to me that No Labels is trying to co-opt the very real frustration most Americans feel for the political polarization and legislative logjam they see every day.  I fear No Labels is cleverly reframing the meme of transpartisanship to rally growing populist energies around a hidden special interest agenda — perhaps building a movement to support a Bloomberg presidential bid in 2012.

Check out “No Labels: What’s Behind “Forward?” Pro-Corporate Economic Policy.”  While I don't agree with everything Jim Cook writes or implies there, I think it is significant that all three No Labels co-founders are professionally involved in promoting corporate interests, and that they advocate tapping Social Security to reduce the debt — when SS is not actually a part of the federal budget, per se, but is a collective retirement account into which workers have paid for decades which has lately been ripped off for budgetary expenditures.  Their budget concerns do not highlight the gigantic portion of the actual budget that goes to military expenditures — to say nothing of the non-budgeted expenditures for the wars in Iraq and Iran which constitute a gigantic part of the federal debt — military expenditures that are greater than all other military budgets in the world combined.  Nor do they feature the many forms of corporate welfare and the option of raising taxes on the hyper-wealthy to the 1950s levels.  Notably, they depend heavily on the Peter G. Peterson Foundation, a very partisan source, as their favorite budgetary reference.

The whole thing doesn't smell right to me. But I do see it as another indicator of how powerful the emerging transpartisan populist trend is, that so much elite attention is being dedicated to co-opting it.

Continue reading “Tom Atlee Proposes distributed-intelligence, crowd-sourcing participatory think tank for popular common-sense policies, unhindered by party affiliations and ideology”

Journal: Wind Power Boondoggle–and the Information Operations (IO) Challenge of Energy and Time in Relation to Policy, Acquisition, and Operations

Advanced Cyber/IO, Analysis, Budgets & Funding, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Earth Intelligence, Ethics, History, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Key Players, Methods & Process, Officers Call, Open Government, Peace Intelligence, Policies, Strategy, Threats
Chuck Spinney Recommends...

My good friend Robert Bryce, author of the must-read Power Hungry: The Myths of ‘Green' Energy and the Real Fuels of the Future just launched this little torpedo.

A Wind Power Boonedoggle

T. Boone Pickens badly misjudged the supply and price of natural gas.

By ROBERT BRYCE, Wall Street Journal, 22 December 2010

After 30 months, countless TV appearances, and $80 million spent on an extravagant PR campaign, T.

Boone Pickens has finally admitted the obvious: The wind energy business isn't a very good one.

Read full article….

Click to Enlarge

Phi Beta Iota: Buckminster Fuller and Russell Ackoff nailed it–everything has to be evaluated in relation to energy source and cost and time cost, and you have to focus on doing the right things, not doing the wrong things righter.  Where Mr. Pickens went wrong was in sticking with the centralized ownership concept.  Wind power and solar power are best for localized applications.  The central grid–the Industrial Era top down control grid, is DEAD.  Similarly, water and sewage should not be centralized grids demanding massive investments in collection and processing.  The graphic to the right shows corruption in the center–when analytics and decision-making lose their holistic integrity, they inevitably fail to achieve the desired outcome while creating cascading costs everywhere else.  Military spending in the USA is at the beginning of a nose dive–our military leaders would be wise to get a grip sooner than later, and “beat the dive” by making evidence-based decisions (Advanced IO) sooner than later.  Now a really advanced thought: 21st Century national security is about eradicating corruption at home and abroad–this makes possible the creation of a prosperous world at peace.  The breadth of that challenge is in the graphic below.  That is an IO challenge, not a kinetic challenge.  IO must be co-equal to kinetics beginning immediately.  In our humble opinion.

Click to Enlarge

See Also:

Journal: ‘Systemic Corruption’–Daunting Challenge in Globalized Era

Reference: Frog 6 Guidance 2010-2020

Reference: Transparency Killer App Plus “Open Everything” RECAP (Back to 01/2007)

Reference: Cultures of Resistance–A Look at Global Militarization

Journal: CIA WikiLeaks Task Force (aka WTF, One Down From REMF)

07 Other Atrocities, Computer/online security, Cultural Intelligence, Government, InfoOps (IO), IO Sense-Making, IO Technologies, Officers Call, Policies
Marcus Aurelius Recommends

washingtonpost.com

CIA launches task force to assess impact of U.S. cables' exposure by WikiLeaks

By Greg Miller Wednesday, December 22, 2010; 12:24 AM

The CIA has launched a task force to assess the impact of the exposure of thousands of U.S. diplomatic cables and military files by WikiLeaks.

Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: W.T.F.

The irreverence is perhaps understandable for an agency that has been relatively unscathed by WikiLeaks. Only a handful of CIA files have surfaced on the WikiLeaks Web site, and records from other agencies posted online reveal remarkably little about CIA employees or operations.

Read full article….

Very cool map and other graphics

Phi Beta Iota: We understand that CIA used to handle Department of State Embassy traffic, and the ugly little fact associated with WikiLeaks, that the Department of Defense is now handling Department of State traffic, has been buried.  The DoD “Grid” is hosed and is never going to be fixed absent a a clean sheet break from the legacy and the contractors.  GAO is interested in doing an update to its first two damning indictments of DoD's Swiss Cheese Communications environment, it just needs one Member of Congress to ask for it….

Afterthought: CIA had a chance in 1986, under Bill Donnelly (DDA), Ken Weslick (C/DO/IMS), and Robert Steele (PM Project George (Smiley)), in combination with the superb work of Gordon Oehler, Dennis McCormick, and Diane Webb in in DI/OSWR, to get  it right.  They were specifically told at the highest levels that they needed to do two things: change the paradigm from “once in, everything visible” to “need to know tracking and accountablity,” and implement the “reverse hit” strategy that disclosed need to know hits to the owner of the clandestine or covert information rather than the seeker.  With Bill Casey's death CIA lost whatever chance it had of entering the 21st Century moderately coherent.  We have wasted close to a quarter century because DoD had a death drip on ADA and refused to contemplate object-oriented programming or open source software for decades beyond ADA's natural death, and OMB gave up the concept of inter-agency interoperability and secure information-sharing in the 1980's.  At the same time, the National Information Infrastructure was all theater and no security.  Marty Harris meant well, but he simply would not focus on fundamentals such as code-level security, education, and strict classification limitations.

See Also:

2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise

2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid

2004 General Accountability Office (GAO) Report: Defense Acquisitiions: The Global Information Grid and Challenges Facing Its Implementation

Journal: Pentagon Flails in Defending Cyberspace

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Journal: Israel Persists on Polard–an Information Operations (IO) Case Study

07 Other Atrocities, 08 Wild Cards, 09 Justice, 10 Security, 11 Society, Corruption, Cultural Intelligence, Government, IO Sense-Making, Military, Officers Call
Marcus Aurelius Recommends

In Wash Post article on CIA's Wikileaks TF, passed u/s/c, the following quote closes the piece, “the former high-ranking CIA officer said. “Nobody could carry out enough paper to do what WikiLeaks has done.””  Not sure that's true.  Open source reporting not long after his trial indicated that Pollard hand carried tremendous volumes of paper documents out of his office to the Israelis; if memory serves, it amounted to hundreds of cubic feet.  Volume was so great that the Israelis set up a safesite equipped with a copying machine of significant capability so that they could quickly copy Pollard's offerings and let him carry them back to the office.

New York Times December 22, 2010 Pg. 6

Israel Plans Public Appeal To Ask U.S. To Free A Spy

By Isabel Kershner

JERUSALEM — Prime Minister Benjamin Netanyahu of Israel will officially and publicly appeal to President Obama in the coming days for the release of Jonathan Jay Pollard, the American serving a life term in a North Carolina prison for spying for Israel, Mr. Netanyahu’s office announced Tuesday.

Read rest of article that makes clear Israel believes it can win on this perfidious demand.

Phi Beta Iota: The facts are clear.  Pollard approached other governments before he approached Israel.  His elevation into a national hero to be brought home to accolades is perfectly consistent with what every Jewish male cutting a swath through Christian girls accepts as his mantra: “Chiksas don't count.”  Evidently the crew and families of the USS Liberty don't count either.  We strongly support the US Intelligence Community's view that Pollard is a traitor and should die in prison.  We also strongly support the need to for a comprehensive review of how every US taxpayer dollar is spent in the Middle East, with the objective of ending military support to dictators and financial support to Israel.  Creating a regional water and educational trust makes more sense to us.  At the same time, the fact is that at least three quarters of what we have classified should not be classified, and we are out of touch with unclassified reality across all ten high-level threats.  We need to heal ourselves before we attempt to heal others, Pollard is an excellent case study of how out of touch both Israel and the White House are with reality.

Reference: Truth & Nuance as an Information Operations (IO) Mission

Analysis, Articles & Chapters, Collaboration Zones, Communities of Practice, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), Intelligence (government), IO Sense-Making, Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Officers Call, Open Government, Policies, Power Behind-the-Scenes/Special Interests, Real Time, Secrecy & Politics of Secrecy, Strategy, Threats
Kelley Vlahos

Aldous Huxley Would Be Proud

by Kelley B. Vlahos, December 14, 2010

EXTRACT:  British novelist Aldous Huxley was a social critic and futurist, who is best known for penning Brave New World, which, aside from being a nearly 80-year-old science fiction masterpiece, is both an allegory and prophecy for 21st Century western society.

Huxley’s finger was on the pulse of human freedom, and he warned us over 50 years ago that it was fading fast. In 1958, he predicted that when concentrated in the hands of the “Power Elite,” rapidly evolving “mass communication” like television would be a critical tool of social and political conformity. Technology is only the medium, and it is “neither good nor bad,” Huxley wrote, but when in the wrong hands it can be “among the most powerful weapons in the dictator’s armory.” Propaganda, the suppression of the truth, particularly in democratic societies, Huxley argued, would bring upon an age of human enslavement, where instead of yokes and chains, people in celebrated “free” societies like America would be bound by the soft restraints of ignorance, incuriousness, distraction and irrationality.

. . . . . . .

EXTRACT:  In his 1958 interview with Mike Wallace, Huxley explained his concept of velvet totalitarianism:

“’If you want to preserve your power indefinitely, you must get the consent of the ruled,’ he said. Those in power will do this primarily through ‘techniques of propaganda,’ by ‘bypassing the rational side of man and appealing to his subconscious and deeper emotions’ and ‘making him love his slavery.’”

I would submit that Mr. David Brooks loves his slavery, and furthermore, is the perfect “alpha caste” prototype from Brave New World – he uses the good brains God (Ford) gave him to reflexively sustain the status quo, barking and nipping like a loyal lapdog when something or someone threatens it. The same goes for the rest of the so-called journalistic elite who have taken to the Net and on the television to discredit Assange in recent days, either through bald ad hominem or discrediting his work as “not journalism,” or “criminal.” Proto-elite scrambling among the herd of pundits across the mediascape are the worst, feeling they have to be more red-faced and extravagant in their commentary in order to stand out.

. . . . . . .

EXTRACT:  They aren’t even necessarily things we shouldn’t be reading or have some level of access to. Officials and journalists of every ilk spent the better part of this decade bemoaning the “over classification” of government information before, and especially after, 9/11. When pouring over the reams of information for the 9/11 Commission, former New Jersey Gov. Thomas Kean, who was chairing the commission said, “Three-quarters of what I read that was classified shouldn’t have been.”

Read this entire brilliant piece being categorized as a Historic Contribution.

Phi Beta Iota: Since starting this fight in 1988, the single most valuable body of knowledge we have acquired over those 22 years has been our little black book of great minds that speak the truth across all functional domains.  Kelley Vlahos is married to Michael Vlahos, and they are two of the most nuanced thinkers we know.  The era of secrecy and top-down micro-management for the benefit of the few is over.  It will not be replaced by communism or anarchy, it will be replaced by moral communitarian capitalism and panarchy.  It will focus–as we should have been focused since the end of World War II–on the needs and gifts of the five billion poor who can create infinite wealth, especially when we achieve infinite free energy by turning away from the corruption associated with the scarcity of fossil fuels, and instead tap into the free cosmic energy that Buckminster Fuller addressed so ably.  INTEGRITY IS BACK IN VOGUE.  That's a good thing.

2011 Top 10 Cyber Predictions (and Then Some)

Collaboration Zones, Communities of Practice, Computer/online security, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, IO Sense-Making, IO Technologies, Key Players, Methods & Process, Mobile, Officers Call, Policies, Real Time, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats

2011 Top 10 Cyber Predictions

Posted by Anup Ghosh on December 16, 2010

Everybody is putting out their Top 10 lists of predictions for 2011. Not to be left out of the party, below is a list of what we expect to see in 2011 in Cyber Security.

1.  Malware.

2.  Blame the User.

3.  Reactive approaches to security will continue to fail.

4.  Major Breaches in Sectors with Intellectual Property.

5.  Hacktivists will bask in their new-found glory.

6.  Critical Infrastructure Attacks.

7.  Hello Android.

8.  Windows Kernel Exploits.

9.  Organized Crime rises.

10.  Congress will rear its head.

Read full paragraph that goes with each of the above….

Phi Beta Iota: Nothing wrong with any of the above, except that they are out of context.  As the still-valid cyber-threat slide created by Mitch Kabay in the 1990's shows, 70% of our losses have nothing to do with disgruntled or dishonest insiders, or external attacks including viruses.  Cyber has not been defined, in part because the Human Intelligence crowd does not compute circuits, and the circuit crowd do not computer human intelligence.  We are at the very beginning of a startling renaissance in cyber/Information Operations (IO) in which–we predict–existing and near-term hardware and software vulnerabilities will be less than 30% of the problem.  Getting analog Cold War leaders into new mind-sets, and educating all hands toward sharing rather than hoarding, toward multinational rather than unilateral, will be key aspects of our progress.  Cyber is life, life is cyber–it's all connected.  Stove-piped “solutions” make it worse.

See Also:

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Journal: 1 in 4 Fail US Army Extrance Exam

Journal: Development at Gunpoint? Wasteful & Wrong

Undersea Cables: The Achilles Heel of our Economies

Journal: NSA Assumes It Has Been Compromised…Correct!

Reference: Frog 6 Guidance 2010-2020

Undersea Cables: The Achilles Heel of our Economies

03 Economy, 07 Other Atrocities, 11 Society, Computer/online security

Franz-Stefan Gady

Franz-Stefan Gady

Foreign policy analyst, EastWest Institute

Huffington Post, Posted: December 21, 2010 02:20 PM

In December 2008 within milliseconds, Egypt lost 70 percent of its connection to the outside Internet. In far away India, 50 to 60 percent of online connectivity similarly was lost. In Pakistan, 12 million people were knocked offline suddenly, and in Saudi Arabia, 4.7 million were unable to connect to the Internet. The economic costs of this 24-hour outage: approximately 64 million dollars.

The recent revelations by WikiLeaks of U.S. national security interests in critical infrastructure vulnerabilities mention the often neglected underpinning of the current connectivity revolution sweeping the planet–undersea cables. In December 2008, four undersea cables were cut simultaneously, affecting Internet users all over the world. While cable cuts happen from time to time nothing, the scope of the cuts illustrate the exposure of our economies to disruption once we lose connectivity.

Read full article….

Phi Beta Iota: In 1990 Peter Black published a “top ten” hit list for cyber-space in WIRED Magazine, and the conventionals went nuts.  Shortly thereafter Winn Schwartau testified to Congress on the possibilities of an electronic Pearl Harbor, and Robert Steele added to the conventional hysteria by pointing out that absent “action this day,” there would indeed be a day off reckoning in the future.  Now here's the key bit (not byte):  Information Operations (IO) is mostly about information access, assurance, and analysis. It's about ensuring that the OODA (Observe, Orient, Decide Act) Loop for all deciders, all action officers, all front-line mission specialists, is as good as it can get.  It's about culture, education, leadership, mentoring. A huge part of that lies in addressing human errors & omissions, fully 50% of the data or capability loss; and in the design of the over-all global, national, state, and local information architectures.  Redundancy, for example–but we still have companies putting BOTH cables in the same ditch where they can be cut by ONE swipe of a backhoe….  The underwater cables (not just in the ocean but in inland waters as well) have been pointed out as the Achilles heel since at least 1990, 20 years ago.  One wonders what it will take …..

See Also:

Journal: Weaponizing Web 2.0

Journal: Information Security Seven Guiding Principles

1994 Sounding the Alarm on Cyber-Security

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

Review: Terminal Compromise

noble gold