Journal: IED Deja Vu–from Viet-Nam with Love…

04 Inter-State Conflict, 05 Civil War, 08 Wild Cards, 10 Security, Military
Marcus Aurelius

Robots and bees to beat the Taliban

Full Story Online

The homemade IED is the extremists’ deadliest weapon and America is spending billions on trying to combat it. We are granted access to this secret, smart and bizarre world

Phi Beta Iota: In 1988 the US Marine Corps told the emerging MASINT community that their highest priority was the detection of explosives at a stand off distance regardless of the container.  This was based on USMC experience in El Salvador, where wooden containers were used to defeat mine detectors.  The article is incorrect about mines replacing small arms as the weapon or casualty-causer of choice; mines in Viet-Nam took out more people (and the able-bodied needed to carry the wounded) than any other capability.  The Israeli solution is a well-trained dog.

Journal: Modern Obstacles to Spying & Assassination

07 Other Atrocities, 09 Terrorism, Ethics, Government, Law Enforcement, Military
Marcus Aurelius

(1)  I've seen some of the surveillance video on CNN; here is a link to more.

(2)  Regardless of who ran the operation, sounds like the Hamas guy needed to go;

(3) in addition to surveillance and biometrics, proliferation of commercially-available databases such ChoicePoint  creates additional operational challenges.)

Full Story Online

How spy technologies foil old-school political killings

By R. Jeffrey Smith and Peter Finn

Saturday, February 20, 2010; A13

The practice of secretly assassinating purported enemies of the state — an age-old tool of foreign policy — has run up against steadily improving international police collaboration and the global proliferation of surveillance technologies that make it harder for anyone anywhere to surreptitiously conduct a high-profile killing on foreign soil.

In Doha, London and now Dubai, political killers have been caught on film and tracked, provoking unexpected attention and controversy for the organizers. Because of new biometric technologies, the proliferation of cheap video, and sophisticated monitoring of customs points and airports, the skills of those who specialize in the creation of fictional identities have been tested, and sometimes defeated.

The apparent political killing of Hamas operative Mahmoud al-Mabhouh has ricocheted around the world in recent days after his alleged attackers were spotted by a camera above an elevator at the Dubai Al-Bustan Rotana hotel, in the United Arab Emirates. Four suspects, all obvious weight-lifters, were filmed exiting in pairs and heading for Mabhouh's room.

Shortly after the killing, they were again filmed, this time more nervously boarding the same elevator, wearing the same baseball caps. Then they were filmed again, leaving the airport on flights to Europe, Africa and Asia. On Thursday, Interpol issued warrants for 11 suspects after the Dubai police conducted a careful study of their videotaped movements at nearly a dozen locales. Their mug shots had already been flashed on television screens around the world.ed to this report.

Search: how much is al-qaeda worth?

08 Wild Cards, 09 Terrorism, 10 Security, Government, Law Enforcement, Military, Mobile

Very cool question.  We don't have the answers, but here are a few thoughts.

Who benefits? There is only one beneficiary of Al Qaeda as a virtual actor: the US Military-Industrial-Intelligence-Congressional Complex whose outrageously wasteful funding and excessive (70%) obligations to contractors are bankrupting the US economy, but who cares as long as the corporate gravy train keeps rolling along.  The indigenous peoples seeking self-determination, including the long-repressed people of Saudi Arabia and the long-repressed peoples of Palestine, do not benefit from a model that Mahatma Gandhi clearly understood was self-destructive.  Non-violence is the only sustainable path to self-determination.

Calculating value. With the above firmly in mind, Al Qaeda's “value” to the sole beneficiary, the MIICC, is a combination of three sums:

1.  The sums Al Qaeda and related groups receive from governments, corporations, and individuals interested in sustaining radical Islamic violence against both Muslims and the West.

2.  The sums the US and others spend on false flag operations attributed to Al Qaeda (the underpants bomber is probably an Israeli false-flag operation with US consent and colalboration)

3.  The sums the MIICC receives from a corrupt Congress that has not done a serious national security baseline evaluation of need since Senator Sam Nunn (D-GA) retired from his post as Chairman of the Senate Armed Services Committee.

What is Al Gaeda Worth? Our wild-ass but informed guess is $1 trillion a year.  That one trillion a year is both positive value (for those that benefit) and negative value (for all the others).  With one trillion a year we could have brought the USA into the 21st Century, funded free cell phones for the five billion poor so they could create infinite stabilizing and self-sustaining wealth, and created a prosperous world at peace.

Continue reading “Search: how much is al-qaeda worth?”

Happy Birthday Arno Reuser–Master Librarian

08 Wild Cards, Collaboration Zones, Communities of Practice, Ethics, Librarian Intelligence, Peace Intelligence, Policies, Real Time, Threats, Topics (All Other)
Arno Reuser

PLATINUM LIFETIME ACHIEVEMENT AWARD

Arno “The Curious” Reuser

Mr. Arno Reuser, Arno the Curious, is a Master Librarian who has done more for the practice of Open Source Inteligence (OSINT) in support of national security than anyone else in Europe.  He has been a pioneer in the explotiation of badly-delivered OSINT from private sector vendors, writing original PERL programs to make sense of their feeds; he has known how to make the most of the Internet; and above all, he has known how to find and engage human intellects around the world, each capable of producing unique tailored knowledge not available online or in print.  He is the Master Librarian of the OSINT world and all seven intelligence tribes.

When InterNET is InterNOT (2008)

Virtual Open Source Agency (2006)

Librarian Tradecraft (2003)


Journal: Real-Time Intelligence & Information Sharing

10 Transnational Crime, Law Enforcement, Methods & Process, Peace Intelligence, Real Time
By Benjamin Brown
Posted Feb 11, 2010 @ 04:00 PM
Scituate —

As a way of dealing with cross-town crime and drug use, Scituate police have banded together with other local departments to pursue cases beyond individual town borders.

Marshfield Police Capt. Phil Tavares founded the coalition, formally known as the Old Colony Police Anti-Crime Task Force, or OcPac.

“The most logical approach to combating fiscal hardships and a surge in crime is to make available and consolidate our tangible and intangible resources, as well as real-time intelligence sharing,” said Tavares.

Journal: Taming Twitter–Emergence of Baby World Brain?

Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Ethics, Geospatial, InfoOps (IO), IO Mapping, IO Multinational, IO Sense-Making, Key Players, Methods & Process, Mobile, Policies, Real Time, Reform, Technologies, Threats, Tools
Full Story Online

Taming Twitter’s Streams With Automated Web Sites

Unlike Facebook, whose builders strive to make it an ever more organized social network, Twitter seems to thrive on being a jumble. It is an egalitarian sort of mess: Twitter does not sort its users into categories, does not tag some as celebrities, does not map out who does lunch with whom in the real world. You and Shaquille O’Neal are Twitter equals, only he has an extra 2.8 million followers.

There is also a Web site, Listorious listorious.com where volunteers publish personally chosen lists of posters to follow based on specific themes. But it is hit or miss. The Best of Photography list is a sharp collection of 29 eye-catching feeds, but Tech News People is a pile of 499 journalists for you to sort through.

So, how do you figure out who to follow? Start with a sweeping generalization: Twitter users can be grouped into different categories. For each, there is an automated site somewhere that lets you follow the genre without having to find and follow dozens, or even hundreds, of individual Twitter streams.

Phi Beta Iota: This article provides an extraordinary bridge to the future, when Twitter could become the real-time feed for inputs easily sorted in an infinite number of “back offices” that remix the information by threat, policy, player, and zip code.  The difference between Google and Twitter is that Twitter empowers the end-user, Google ravages the end user (intellectually and metaphorically speaking).

Journal: Ushahidi Rocks in Haiti–New Schematic

08 Wild Cards, Analysis, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Ethics, Geospatial, InfoOps (IO), Methods & Process, Mobile, Policies, Real Time, Technologies, Threats, Tools
Full Story Online

Project 4636 Revisited: The Updated Info Graphic
UPDATE: Since this graphic was published, a few additional clarifications have come to light. Please see Robert’s comment for more details.

Shortly after we posted the original Project 4636 info graphic, a few folks involved in the project got in touch to see if we could clarify the process. There are a lot of moving parts,  many of which are constantly changing, and so the original graphic didn’t quite reflect the exact process as well as it could have. With that in mind, we worked with Josh Nesbit of Frontline SMS Medic and Nicolás di Tada of InSTEDD to make sure the graphic reflected the process as accurately as possible. The biggest update that we made is that InSTEDD’s Nuntium SMS Gateway and the Thomson Reuters Foundation Emergency Information System are now the first entities that receive and process incoming SMS’s.  Everything else is pretty much the same.

Click for Zoomable Version

Journal: Haiti Rolling Directory from 12 January 2010

noble gold