Cynthia McKinney: US & Israel Against Africa & Arabia

04 Inter-State Conflict, 05 Civil War, 06 Genocide, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Government, Hill Letters & Testimony, Legislation
Cynthia McKinney

Cynthia McKinney, 10 October 2011.

Third of Four Installments on Libya: Israel and Libya

Once again, Mahdi Darius Nazemroaya peels away the veneer of legitimacy and deception enveloping the U.S./NATO genocide currently taking place in Libya. In his first article, Nazemroaya exposed the mechanism by which the world came to “know” of the need for a humanitarian intervention in the Libyan Arab Jamahirya and U.S./NATO admissions of targeted assassination attempts against the Leader of the 1969 Libyan Revolution, Muammar Qaddafi. In his first of these four installments since his return from Libya, Nazemraoya makes it clear that there never was any evidence given to the United Nations or the International Criminal Court to warrant or justify United Nations Resolutions 1970 and 1973 or current U.S./NATO operations inside Libya.

Continue reading “Cynthia McKinney: US & Israel Against Africa & Arabia”

Robert Steele: Ignored 1994, Ignored 2011–Deja Vu

07 Other Atrocities, Advanced Cyber/IO, Civil Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, DHS, Director of National Intelligence et al (IC), DoD, Government, Hill Letters & Testimony, IO Impotency, Legislation, Military, Policies, Standards, Technologies
Robert David STEELE Vivas

One of our contributors passed this to me and asked me to comment in relation to the alarm that Winn Schwartau, Bill Caeli, Jim Anderson, and I sounded in 1994, in writing, to Marty Harris, then head of the National Information Infrastructure (NII).

First, the item.

From the man who discovered Stuxnet, dire warnings one year later

Mark Clayton

Christian Science Monitor, 22 September 2011

Stuxnet, the cyberweapon that attacked and damaged an Iranian nuclear facility, has opened a Pandora's box of cyberwar, says the man who uncovered it. A Q&A about the potential threats.

EXTRACT:

CSM: How would you characterize the year since Stuxnet – the response by nations, industry and government?

LANGNER: Last year, after Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems…. That wakeup call lasted only about a week. Thereafter, everybody fell back into coma. The most bizarre thing is that even the Department of Homeland Security (DHS) and Siemens [maker of the industrial control system targeted by Stuxnet] talked about Stuxnet being a wakeup call, but never got into the specifics of what needed to be done.

Continue reading “Robert Steele: Ignored 1994, Ignored 2011–Deja Vu”

Owl: Pregressive Radio on 9/11 & FBI Saudi Cover-Up

08 Wild Cards, 09 Justice, 10 Security, 11 Society, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Government, Hill Letters & Testimony, IO Deeds of War, Law Enforcement, Military
Who? Who?

Susan Lindauer, former Intel Asset: What She Knows About 9-11

This is spell-binding radio. Given what she knows, her interviewer, Gary Null, wonders out-load why she has not yet been assassinated. Here’s why:

Susan Lindauer is a former U.S. Intelligence Asset who covered anti-terrorism at the Iraqi Embassy in New York from 1996 up to the invasion. Independent sources have confirmed that she gave advance warning about the 9/11 attack. She also started talks for the Lockerbie Trial with Libyan diplomats.  Shortly after requesting to testify before Congress about successful elements of Pre-War Intelligence, Susan became one of the first non-Arab Americans arrested on the Patriot Act as an “Iraqi Agent.” She was accused of warning her second cousin, White House Chief of Staff Andrew Card and Secretary of State Colin Powell that War with Iraq would have catastrophic consequences. Gratis of the Patriot Act, her indictment was loaded with “secret charges” and “secret evidence.” She was subjected to one year in prison on Carswell Air Force Base in Fort Worth, Texas without a trial or hearing, and threatened with indefinite detention and forcible drugging to shut her up. After five years of indictment without a conviction or guilty plea, the Justice Department dismissed all charges five days before President Obama’s inauguration.

Listen to or download the whole show from this link:

There is more, very recent and stunning news – with evidence presented – about 9-11 here:

Continue reading “Owl: Pregressive Radio on 9/11 & FBI Saudi Cover-Up”

Mario Profaca: US Lacks Cyber-Intelligence + RECAP

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Director of National Intelligence et al (IC), Government, Hill Letters & Testimony, IO Impotency, Law Enforcement, Military
Mario Profaca

US lacks serious cyber intelligence

Study says US government, business need to kick network security up a notch

Michael Cooney

Network World, 12 September 2011

There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current “patch and pray” system won't cut it in the future.

That was the major thrust of a study by the  Intelligence and National Security Alliance's (INSA) Cyber Council  which went on to state that  such a cyber-intelligence discipline will demand discussion of the unique training, education and skill sets that will be required to successfully conduct meaningful collection and analysis in the cyber domain.

Background: Who really sets global cybersecurity standards?

“While there is a great deal of focus on current cyber security issues, there is little focus on defining and exploring the cyber threat environment at a higher level,” INSA stated.  INSA describes itself as a non-profit, non-partisan, public-private organization.

The group says the dilemma that exists in the current cyber intelligence apparatus is that the Department of Homeland Security has the authority but lacks the experience and capabilities to orchestrate a comprehensive approach to cyber intelligence. The Department of Defense has much of the actual cyber intelligence capabilities, and private industry owns most of the infrastructure. “Ultimately, INSA's Cyber Council would like to see a meaningful partnership among all relevant government agencies and the private sector to ensure seamless sharing of threat information, timely analytical judgments, and reasoned, measured responses to clear threats.”

The group made a number of suggestions to help businesses and government build this intelligence community including:

  • Develop strategies (beyond current “patch and pray” processes), policies, doctrines, legal frameworks, and overall global context for cyber intelligence matters
  • Increase global business, diplomatic and other forms of engagement, which should discuss potential ways to create more stability and mutual security in the cyber arena in order to reduce the potential for cyber conflict, theft, sabotage, and espionage
  • Support development of deterrence, dissuasion, and other high level concepts and measures for maintaining peace and stability at all levels of conflict and crisis
  • Define cyber intelligence professions, needed skillsets, training, and education for both industry and government needs.
  • Enable the creation of cyber intelligence related polices, approaches, and pilot efforts across industry, academia/non-profits, and government that provide unclassified situational awareness and indications and warning data, analytics and 24/7 unclassified and classified (as appropriate) reporting to government agencies, trusted industry, and global partners.
  • Corporately define specific activities, plans, and intentions of adversaries; continuously identify current and emerging threat vectors, and support our plans and intentions
  • Identify the specific technical means utilized or planned for cyber attack operations in deep technical detail to include supply chain issues, paths to be exploited, nature and character of deployed infections, systems/product weakness, effects, and anticipated planned or ongoing adjacent activities
  • Maintain detailed cyber situational awareness writ large
  • Participate in the rapid control and release of cyber means in order to ensure a viable intelligence gain and loss awareness
  • Identify what criminal activities are ongoing or have already happened in cyber networks, do formal damage assessments in these areas, and support development of improved defenses
  • Partner on research and development in the challenging areas of attack attribution, warning, damage assessment, and space related threat collection and analysis
  • Organize and support counter-intelligence and counter-espionage (CI/CE) activities, with special focus on identifying/using auditing tools and processes to deal with the insider threats
  • Create a consistent and meaningful approach for the cyber equivalent of Battle Damage Assessment (BDA)/Combat Effectiveness Assessment
  • Establish public-private partnership cyber outreach forums that address these areas in a comprehensive, practical, and executable fashion. These forums can take the form of commissions that study the demand for cyber intelligence and value added to cyber security.

Phi Beta Iota:  The US is not just lacking in cyber-intelligence, it is lacking in all forms of intelligence qua decision-support.  The US intelligence community lacks integrity, and General Keith Alexander and General Jim Clapper and Mr. Mike Vickers have all been given too much money with zero adult leadership.  Top Secret America is a disgracefully dysfunctional enterprise, and now richly deserving of almost complete shut-down.  Congress and the White House have failed to be ethical or intelligent in this matter.

INSA PDF Report

See Also:

Continue reading “Mario Profaca: US Lacks Cyber-Intelligence + RECAP”

David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation

Advanced Cyber/IO, Collaboration Zones, Communities of Practice, Corruption, Director of National Intelligence et al (IC), Ethics, Hill Letters & Testimony, IO Impotency

PRINT VERSION (Memorandum to SSCI & HPSCI with Attached Post)

David Isenberg

SHORT URL FOR THIS SPECIFIC POST:

http://tinyurl.com/Clapper-Steele

For information.

SEPTEMBER 7, 2011

How 9/11 Transformed the Intelligence Community

It's no longer about ‘need to know.' Our guiding principle is ‘responsibility to share.'

By James R. Clapper

It has been a decade since our nation suffered the greatest strategic surprise on American soil since the attack on Pearl Harbor. In the aftermath of September 11, as the country sought to understand how such a complex attack could go undetected, much attention was focused on the intelligence community. Pundits, scholars, commentators and others quickly labeled 9/11 an intelligence failure.

Read full original.

Phi Beta Iota:  General Clapper means well, but his Op Ed is utterly disingenous and completely out of touch with reality.  Below the line is a safety copy of his Op Ed with inserted commentary.

Continue reading “David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation”

Reference: Smart Nation Act (Simplified) 2011

Advanced Cyber/IO, Analysis, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Congressional Research Service, Ethics, General Accountability Office, Hill Letters & Testimony, InfoOps (IO), Intelligence (government), Key Players, Legislation, Memoranda, Methods & Process, Mobile, Office of Management and Budget, Officers Call, Open Government, Policies, Policy, Politics of Science & Science of Politics, Real Time, Reform, Research resources, Resilience, Serious Games, Standards, Strategy, Technologies, Threats
Click on Image to Enlarge

Original Online (.doc 1 page)