Owl: Drugs of War – The Imperial Trade, Banks on Top

03 Economy, 07 Other Atrocities, 09 Justice, 10 Transnational Crime, 11 Society, Commerce, Commercial Intelligence, Corruption, Director of National Intelligence et al (IC), Economics/True Cost, Government, Knowledge, Law Enforcement, Media, Military, Money, Officers Call, Politics
Who? Who?

A Jaw-Dropping Explanation of How Governments Are Complicit in the Illegal Drug Trade

The drug war is far, far more than just simply criminals at work, says scholar Oliver Villar.

Note: The following interview helps us understand the drug war from a dramatically different perspective than the one the corporate media paints. Instead the traditional portrayal of the war on drugs as a fight between law enforcement and illicit drug dealers, scholar Oliver Villar explains that the illegal drug trade is a tool of empire a means of “social control” as much as profit. Villar, a lecturer in politics at Charles Sturt University in Bathurst, Australia's insight is well worth the read.

EXTRACT:

LS: Catherine Austin Fitts, a former investment banker from Wall Street, shared this observation once with me:

Essentially, I would say the governments run the drug trade, but they're not the ultimate power, they're just one part, if you will, of managing the operations. Nobody can run a drug business, unless

the banks will do their transactions and handle their money. If you want to understand who controls the drug trade in a place, you need to ask yourself who is it that has to accept to manage the transactions and to manage the capital, and that will lead you to the answer who's in control. [2]

What are your thoughts on this essential equation?

Read full interview.

Continue reading “Owl: Drugs of War – The Imperial Trade, Banks on Top”

Open Source Intelligence (OSINT) Re-Boot

Articles & Chapters

The two below references have finally been updated and the original PDFs are now online (they were lost when site moved from Sweden and previous oss.net shortcuts were lost).

NEW:  2008 Open Source Intelligence (Strategic)  OLD:  http://www.oss.net/OSINT-S

Introduction  OSINT and Intelligence Reform  – History  – Requirements  – Collection  – Processing  – Analysis  – Covert Action  – Counterintelligence  – Accountability, Civil Liberties, and Oversight  – Strategic Warning  – Strategic Sharing  – Emerging Prospects  — Digitization  — Visualization  —  Peer-to-Peer (P2P)  OSINT and Electoral Reform  OSINT and Governance Reform  OSINT and Strategic Budgetary Reform  Notes 1-44

NEW: 2008 Open Source Intelligence (Operational)  OLD:  http://www.oss.net/OSINT-O

Executive Summary  – Definition and scope  – Open source intelligence and joint or coalition operations  – Private sector information offerings  – OSINT and the emerging future intelligence architecture of NATO  Introduction to Open Source Intelligence  – Definitions  – OSINT in context  – OSINT and information operations  – OSINT and national security  – OSINT and the larger customer base for intelligence  – OSINT and the levels of analysis  – OSINT and coalitions  – OSINT and saving the world  – OSINT as a transformative catalyst for reform  Open Sources of Information  Open Source Software and Software for Exploitation  Open Source Services  The Open Source Intelligence Cycle  Applied Open Source Intelligence  – Open source intelligence tradecraft  – Mission relevance of open source intelligence  — Missioon area applications  Conclusion  – Money Matters  — Funding trade-offs  — Contracting mistakes  — Metrics for measuring return on investment  —–Cost of secrecy  —–Relative value  —–Return on sharing  — Commercial strategy  — Budget and manning implications  – The value of sharing  References  Acronyms  Notes 1-30

See Also:

Open Source Intelligence (OSINT) Starting Point

Open Source Agency Executive Access Point

Steven Aftergood: DoD IG Shines Light on DoD Security Incoherence

Corruption, DoD, IO Impotency, Military
Steven Aftergood

DOD SECURITY POLICY IS INCOHERENT AND UNMANAGEABLE, IG SAYS

“DoD security policy is fragmented, redundant, and inconsistent,” according to a new report from the Department of Defense Inspector General.  This is not a new development, the report noted, but one that has persisted despite decades of criticism.

There are at least 43 distinct DoD security policies “covering the functional areas of information security, industrial security, operations security, research and technology protection, personnel security, physical security, and special access programs,” the Inspector General report noted.

“The sheer volume of security policies that are not coordinated or integrated makes it difficult for those at the field level to ensure consistent and comprehensive policy implementation.”

Continue reading “Steven Aftergood: DoD IG Shines Light on DoD Security Incoherence”

Berto Jongman: Interesting Global Security Links

Links (Global Security)
Berto Jongman

British Special Forces in Syria

CI Glossary (PDF at Cryptome)

Collapsing US Credibility

Convergence of Organized Crime and Terrorism

Dark Money in USA – Mother Jones

Drone Civilian Death Claims Mount

Drone Death Figures Do Not Add Up

Drone Policy Transparency

Global financial cybercrime sting yields 24 arrests

Drug Violence Interactive Map

EU Plan for European Monetary Union

Euro Collapse – Consequences

Failing Drug War Impacts on AIDS/HIV

French Reporter in Colombia Documentary

Gene Sharp: A dictator's worst nightmare

Human Costs of Piracy

Iran – Possible Consequences of Attack

Little America in Afghanistan

Oil the Next Revolution (Price Collapse)

Plutonium Criticality Event

Politics or Gang Warfare

Radioactive Conflicts of Interest

Routledge Handbook on Religion and Security

Russian Cybercrime Resources

Rwandan Genocide Documents

Terror Drill Philadelphia

Threat of Designer Drugs

Torture in Israel

UN official proposes use of satellite imagery to protect civilians in armed conflict

Violence in Mexico

World Drugs Report

Berto Jongman: Interesting Global Security Links

Links (Global Security)
Berto Jongman

Afghanistan Poisoning of School Girls

Anti-Piracy and Humanitarian Operations

British Jihaddists Training in Middle East

David Sanger Revelations

Drugs, Crime, & Development

Election Theft in the USA

FBI Mueller on TEDAC and IED Analysis

From Drugs to Gold – Baron Diversification

Happy Planet Index

India's Cyber-Security

Russia Music and Protest

Russian Botnet – 6 million communities

Singularity Debate

US Drug Raids in Honduras

VIDEO: Post-Singularity Life

VIDEO: Steve Jobs Biographical

Violent Online Extremism Study

Berto Jongman: Interesting Global Security Links

Links (Global Security)
Berto Jongman

Alan Turing the Original Hacker

Avatar Increasing Need For…

Bank Crime Statistics

Concerned Historians Annual Report

Cyberspace Neutrality and National Responsibility

Extraordinary Things from Humble Origins

India Terrorist Threat Within

Political Scientists are Lousy Forecasters

Radical Openness as an Organizing Principle

Reverse Engineering the Human Brain

Richard Falk on Middle East

Transparency Ending Tyranny

VIDEO: Dronetopia, with commentary