2013 Robert Steele Reflections on [Search:] non+traditional+threat 1.2

Civil Society, Cultural Intelligence, Earth Intelligence, Peace Intelligence, Searches, Threats
Robert David STEELE Vivas
Robert David STEELE Vivas

ROBERT STEELE:  I have elected to answer this personally.  It may well be the most fundamental question this web site has received in that any corruption in the answer to this question assures the failure of any strategy, policy, acquisition, or operation that is spawned from an inherently corrupt — a deliberately corrupt — refusal to take the question seriously.

There are several ways to address this.  The first is the most obvious, which is to say that the traditional threat is state on state conventional forces, and the non-traditional threats are everything else.  Here in one chart is what General Al Gray, USMC, then Commandant of the Marine Corps, with my assistance as his ghost-writer, put in “Global Intelligence Challenges in the 1990's” (American Intelligence Journal, Winter 1989-1990).

Click on Image to Enlarge
Click on Image to Enlarge

The whole point of that article was to suggest that both the US Intelligence Community and the US Department of Defense needed to radically alter how they trained, equipped, and organized.  I now realize that it was corruption, not stupidity, that buried this message.  As SOCOM and Navy Irregular Warfare said in defending their decision not to go after the Somali pirates from 2005-2008 and later, “it's not an expensive enough problem.”

Continue reading “2013 Robert Steele Reflections on [Search:] non+traditional+threat 1.2”

Search: strategic open source information

Searches

This is still the single best overview with the relevant graphics.

2008 Open Source Intelligence (Strategic) 2.0 [Full Text Online]

It's not enough to focus on strategic open source information.  You have to have a strategic analytic model, a viable OSE technical solution for information-sharing and sense-making that plays well with others and scales, and a deep commitment to actually doing M4IS2.

Continue reading “Search: strategic open source information”

Search: robert garigue security bio

Searches
Robert Garigue
Robert Garigue

Robert Garigue (RIP) remains one of the giants of 21st Century cyber-security.  He was 20 years ahead of his time, and most have still not caught up with him.  Below is his cloud list, but we have also selected a few items to showcase.  Trust on the edges, not centralized butts in seats, is the heart of security.

Garigue

Click on Image to Enlarge
Click on Image to Enlarge

Here is the single coolest slide that he and Robert Steele created together.  We strongly recommend every single thing he has ever published, when he died in his sleep at the age of 50, we did what we could to gather up his work and showcase it here in memory and in perpetuity.

See (Selective):

Gunnar Peterson on Robert Garigue’s Last Briefing [Note: this is the one briefing that best captures the idiocy across the US cyber-system — still pretending to build Maginot Lines and still absolutely utterly with a clue at the code level.]

Robert Garigue, CISO Briefing

Robert Garigue: Feedback for Dynamic System Change

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

Robert Garigue: Strategic Evolution of Information Security

Robert Garigue, “Technical Preface” to Book Three

Robert Garigue: Three Information Security Domains–the Physical (Old), the Process (Current), and the Content (Future)

Robert Garigue: When Everything Else is Distributed….

Who’s Who in Cyber-Intelligence: Robert Garigue

Search: what cars can be cyberhacked

Searches

All cars can be cyber-hacked, either leveraging internal computers or by attaching a disposable kit.

As a general rule, all modern cars that come with an integrated computer are easily hacked.  For older cars one can attack one's own small transponder and kit to do certain things at certain times, such as explode the gas tank or burn through the brake lines, destroying evidence of the attack method in the process.

Continue reading “Search: what cars can be cyberhacked”

Search: management, integration, and oversight of intelligence collection and covert action

Searches
Click on Image to Enlarge
Click on Image to Enlarge

Here is the original post of the document and our critique.

Reference: Intelligence Community Directive (ICD) Number 300: Management, Integration, and Oversight of Intelligence Collection and Covert Action

Since then the position of the ADDNI/OS has been abolished, the long-standing director of the OSC that did so much damage in his ignorance and arrogance has retired, to be replaced by a second stringer from the NRO, and of course we now know that there is no management, no integration, and no oversight of intelligence collection and covert action — nor is there any management, integration, and oversight of everything else: processing, analysis, outreach, sharing, or the creation of ethical evidence-based decision-support, which is simply not what the US secret world does.  It collects — everything — as espensively as possible.  It kills with drones — with a 98% error rate — and also very expensively.  It does nothing useful to Whole of Government to to creating a prosperous world at peace, a world in which the USA can enjoy the fruits of peace, commerce, and friendship.

Below are a few graphics and high-level pieces on what the US intelligence should look like.  They are logical extensions of the earlier pieces published in the early 1990's.

Continue reading “Search: management, integration, and oversight of intelligence collection and covert action”

Search: humint [as of 2013-06-13]

Searches
Click on Image to Enlarge
Click on Image to Enlarge

HUMINT is the heart of the matter.  What CIA, DIA, SOCOM, and DHS are doing in the HUMINT arena is more of the wrong thing.  Now that NSA is being revealed as the naked (and rather dumb) emperor of intelligence, IMINT is largely dead (and what the drones should be doing instead of killing 98% wrong targets), MASINT is still not worth the money we spend on it, and OSINT has been corrupted beyond belief, the time is right to revisit the entirety of intelligence (decision-support).  Here is my HUMINT scorecard only, 2012 USA Human Intelligence (HUMINT) Scorecard 1.1  and three starting points:

Intelligence for the President–AND Everyone Else, as published in CounterPunch, Weekend Edition, February 27 – 1 March 2009

Fixing the White House and National Intelligence, International Journal of Intelligence and Counterintelligence, Spring 2010

Human Intelligence (HUMINT): All Humans, All Minds, All the Time(US Army Strategic Studies Institute, June 2010

Click on Image to Enlarge
Click on Image to Enlarge

At the highest level, new and not captured by the search term, we recommend:

Manifesto Extracts

NATO OSE/M4IS2

Open Source Agency (OSA)

Public Intelligence 3.3

USA Reform Ideas

Way of the Truth

humint is such a common search you are almost always better off starting with the Search Directory in the middle column,

That will yield right away:

Continue reading “Search: humint [as of 2013-06-13]”