Reference: Has Wikileaks Killed Secrecy?

About the Idea, Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Ethics, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, Journalism/Free-Press/Censorship, Key Players, Methods & Process, Money, Banks & Concentrated Wealth, Officers Call, Open Government, Policies, Policy, Power Behind-the-Scenes/Special Interests, Real Time, Reform, Research resources, Secrecy & Politics of Secrecy, Strategy, Threats
Jeff Jarvis

Julian Assange - WikileaksWikileaks: Power shifts from secrecy to transparency

Welt am Sontag in Germany asked me for an op-ed on Wikileaks. Here it is, auf Englisch. Hier, auf Deutsch.

Government should be transparent by default, secret by necessity. Of course, it is not. Too much of government is secret. Why? Because those who hold secrets hold power.

Now Wikileaks has punctured that power. Whether or not it ever reveals another document—and we can be certain that it will—Wikileaks has made us all aware that no secret is safe. If something is known by one person, it can be known by the world.

Full article online.

See Also:

Reference: On WikiLeaks and Government Secrecy + RECAP on Secrecy as Fraud, Waste, & Abuse

Reference: Transparency Killer App Plus “Open Everything” RECAP (Back to 01/2007)

Safety copy below the line.

Continue reading “Reference: Has Wikileaks Killed Secrecy?”

Reference: Transparency Killer App Plus “Open Everything” RECAP (Back to 01/2007)

Collective Intelligence, Communities of Practice, Key Players, Mobile, Officers Call, Real Time, Threats, Topics (All Other)

Gregory UnruhGregory Unruh

Director of the Lincoln Center for Ethics in Global Management at Thunderbird

Posted: December 3, 2010 03:21 PM

Transparency: The Internet's Killer CSR App

EXTRACT: Today “Wikileaks” makes the McLibel case look like child's play. Corporate executives should watch closely as diplomats cringe under the sudden and violent spotlight. The same scrutiny is coming to the corporate world. Wikileaks founder Julian Assange has already announced the private sector is his next target. It may be that governments find a way to silence Assange (Wikileaks.org is already undergoing shadowy cyber attacks to shut it down) but it wont stop the wave of involuntary transparency that the Internet provides. Transparency is the Internet's killer CSR app. You can either get out in front of it or fall prey to it.

Read entire post….

Phi Beta Iota: The post is an elegant, concise articulation such as has not appeared elsewhere to our knowledge.  The lines are drawn, all that is lacking is the precipitating factor to launch the revolution.  “Profit Recovery” is going to join “True Cost” as the new meme, but instead of secretive beltway bandits maurading across the health industry–to take one example–it will be the public willfully exposing that which must be restored to the Commonwealth.

See Also: (46 Items):
Continue reading “Reference: Transparency Killer App Plus “Open Everything” RECAP (Back to 01/2007)”

Reference: The Modern Big Picture–Two Minds

Analysis, Articles & Chapters, Collective Intelligence, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Earth Intelligence, Ethics, Geospatial, History, InfoOps (IO), IO Sense-Making, Key Players, Methods & Process, Officers Call, Open Government, Peace Intelligence, Policies, Politics of Science & Science of Politics, Real Time, Reform, Secrecy & Politics of Secrecy, Strategy, Technologies, Threats, Tools, Waste (materials, food, etc)

Extract from Conclusion in the Above:  I have observed the World Game as a student-participant, and wish it well. I have also observed Bob Pickus's work, as a student-participant in Turn Toward Peace, and wish him well. There are still other alternatives, but whichever road leads us faster into a world without war, what I gain most from Pickus and Fuller is their sense of the Big Picture. No one else can match their indefatigable and comprehensive efforts to see the problem whole, and to steer the world's energy into a grand design of peace.

See Also:

Who's Who in Collective Intelligence

Who's Who in Peace Intelligence

BigPictureSmallWorld

BigPicture Consulting

Design Science Lab

Global Education Lab

EarthGame

Reference (2): United Nations Intelligence in Haiti

05 Civil War, 07 Other Atrocities, 08 Wild Cards, 10 Security, 10 Transnational Crime, 11 Society, Analysis, Augmented Reality, Ethics, Government, Historic Contributions, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Law Enforcement, Methods & Process, Military, Officers Call, Peace Intelligence, Real Time
Peace Operations: Seeing

MajGen Eduardo ALDUNATE Herman, Chilean Army (Ret), served as the Deputy Force Commander of the United Nations Force in Haiti (MINUSTAH) in the earliest rounds, and was instrumental in both sponsoring the Joint Military Intelligence Analysis Center (JMAC) concept in its first modern field implementation, but also in evaluating most critically both the lack of useful intelligence from allies relying on secret sources and methods that did not “penetrate” to achieve gangs and neighborhoods; and the astonishing “one size fits all” propensity of the allies to treat every “threat” as one that could be addressed by force.

His contributions are helpful in understanding the more recent failure of allied relief operations in Haiti that again assumed that the use of armed bodies would address the problem, without making provision for real-world ground truth intelligence (CAB 21 Peace Jumpers Plus) or intelligence-driven harmonization of non-governmental assistance (Reverse TIPFID).

See Also:

Reference: Walter Dorn on UN Intelligence in Haiti

Reference: Civil Military Operations Center (CMOC)

2003 PEACEKEEPING INTELLIGENCE: Emerging Concepts for the Future

Books: Intelligence for Peace (PKI Book Two) Finalizing

Reference: Intelligence-Led Peacekeeping

Review: International Peace Observations

Search: UN intelligence peace intelligence

Journal: Microsoft, Kinect, & Hackers

Collaboration Zones, Communities of Practice, Ethics, IO Technologies, Policies, Real Time, Threats, Topics (All Other)

Innovators like Oliver Kreylos were eager for the Xbox Kinect, but not to play games. He uses it to capture live 3-D images.

With Kinect Controller, Hackers Take Liberties

Mr. Kreylos, who specializes in virtual reality and 3-D graphics, had just learned that he could download some software and use the device with his computer instead. He was soon using it to create “holographic” video images that can be rotated on a computer screen. A video he posted on YouTube last week caused jaws to drop and has been watched 1.3 million times.

Philipp Robbel combined an iRobot device and the new Microsoft controller that can recognize gestures. He calls it the KinectBot.

Mr. Kreylos is part of a crowd of programmers, roboticists and tinkerers who are getting the Kinect to do things it was not really meant to do. The attraction of the device is that it is outfitted with cameras, sensors and software that let it detect movement, depth, and the shape and position of the human body.

Mehmet S. Akten uses the system to draw in 3-D.

Phi Beta Iota: Microsoft took a few days to “get it” but their “final answer” is exactly right: “Anytime there is engagement and excitement around our technology, we see that as a good thing,” said Craig Davidson, senior director for Xbox Live at Microsoft. “It’s naïve to think that any new technology that comes out won’t have a group that tinkers with it.”  Kudos as well to the New York Times for a lovely piece of useful inspiring reporting.

Journal: Web Archipelago of Babel

Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Methods & Process, Mobile, Real Time, Reform, Technologies, Tools

Jon Lebkowsky Home

Berners-Lee: Long Live the Web

I’ve found myself giving cautionary talks on the future of the Internet, or possible futures, plural – the real danger that the Internet and the World Wide Web that operates on it will become less open, perhaps become fragmented, balkanized into closed networks that no longer cooperate, filled with walled gardens with various filters and constraints, and no longer be a platform with low barriers to entry and assurance that if you connect something, anyone anywhere in the world will have access to it. The Internet would no longer be the powerful engine for innovation and communication it has been.

Tim Berners-Lee, who created the World Wide Web, writes about this in Scientific American, saying that some of the web’s “successful inhabitants have begun to chip away at its principles. Large social-networking sites are walling off information posted by their users from the rest of the Web. Wireless Internet providers are being tempted to slow traffic to sites with which they have not made deals. Governments—totalitarian and democratic alike—are monitoring people’s online habits, endangering important human rights.”

If we, the Web’s users, allow these and other trends to proceed unchecked, the Web could be broken into fragmented islands. We could lose the freedom to connect with whichever Web sites we want. The ill effects could extend to smartphones and pads, which are also portals to the extensive information that the Web provides.

Read Berners-Lee’s important longer piece, “Long Live the Web.”

My next scheduled talk about the future of the Internet is January 5 at noon, at Link Coworking [Austin, TX].

Phi Beta Iota: The paradigm is power is “rule by secrecy” and fragmentation.  The web and all that suggests for human connectivity is its anti-thesis.  2012 appears to be the year of convergence, confrontation, and emergence.

Journal: Master Key to the Internet?

02 China, 03 Economy, 10 Security, Commercial Intelligence, Communities of Practice, Computer/online security, Mobile, Real Time

Jon Lebkowsky Home

Are there “master keys” to the Internet?

Interesting article in the New York Times“How China meddled with the Internet,” based on a report to Congress by the United States-China Economic and Security Review Commission. The Times article talks about an incident where IDC China Telecommunication broadcast inaccurate Web traffic routes for about 18 minutes back in April. According to the Times, Chinese engineering managers said the incident was accidental, but didn’t really explain what happened, and “the commission said it had no evidence that the misdirection was intentional.” So there was a technical screwup, happens all the time, no big deal? Or should we be paranoid?

No doubt there’s a lot to worry about in the world of cyber-security, but what makes the Times article interesting is this contention (not really attributed to any expert):

While sensitive data such as e-mails and commercial transactions are generally encrypted before being transmitted, the Chinese government holds a copy of an encryption master key, and there was speculation that China might have used it to break the encryption on some of the misdirected Internet traffic.

That does sound scary right? China has an “encryption master key” for Internet traffic?

Except it doesn’t seem to be true. Experts tell me that there are no “master keys” associated with Internet traffic. In fact, conscientious engineers have avoided creating that sort of thing. They use public key encryption.

So why would the times suggest that there’s a “master key”?

Phi Beta Iota: We have three thoughts:

1)  There's been a movie on the idea, and a low-rent mind might have been led to use the idea for spin.

2)  Much more seriously, we have been told that many routers strip security as a routine means of increasing speed.  We do not know the truth of the matter, since encrypted emails do arrive with encryption, but as a general proposition, security does seem to have been sacrificed to speed, and it may be there is no need for an Internet key in general.

3)  Finally, we would observe that 80% of signals intelligence is pattern analysis, and being able to pull a massive amount of Internet into a place where pattern analysis of who is talking to who can take place, might, conceivably be worth doing.

See Also: