USA Spectrum Out of Control & Self-Destructing

07 Other Atrocities, 10 Security, Advanced Cyber/IO, Computer/online security, Corruption, Cyberscams, malware, spam, InfoOps (IO), Military, Mobile, Officers Call, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Real Time, Secrecy & Politics of Secrecy, Standards, Technologies
DefDog Recommends...

Interesting, and if the point about Garmin is true, what is the relationship between them and the Air Force? The Air Force has gotten into a lot of areas that include tracking to the individual level (RFI) under the guise of tracking logistics….

US Air Force raises concerns over LightSquared's LTE network messing with GPS

Following a navigation system's instructions without driving into a ravine is hard enough as it is — can you even imagine how hard it'd be if you kept losing GPS reception every time you drove within range of an LTE tower? There have been a few anecdotal concerns raised over the last several weeks that LightSquared's proposed LTE network — which would repurpose L-band spectrum formerly used for satellite — is too close to the spectrum used by the Global Positioning System, leading to unintentional jamming when the towers overpower the much weaker GPS signals. Things have gotten a little more interesting, though, now that the US Air Force Space Command has officially piped in. General William Shelton has gone on record saying that “a leading GPS receiver manufacturer just … has concluded that within 3 to 5 miles on the ground and within about 12 miles in the air GPS is jammed by those towers,” calling the situation “unbelievable” and saying he's “hopeful the FCC does the right thing.”

Read rest of article….

Phi Beta Iota: Electromagnetic conflicts have been a known issue since the 1980's.  The Soviets had emission control standards ten times tougher than the US, which had (and continues to have) virtually no standards at all.  This is one reason why US forces in Afghanistan are so severely hampered, with drones, aircraft, radars, and various other “systems” all interfering with one another.  Elsewhere, notably in England, modern cars come to a complete stop within a  couple of kilometers of certain Royal Air Force emitting stations.  All of this can be attributed to at least four root problems:

1.  An acquisition archipelago (nothing sytematic about it) so stupid and out of control as to defy belief.  No standards, no brains, no integrity.

2.  Service-centric and mission-centric “preferred contractor” and “proprietary single point solutions” standard operating processes that are deliberately not orchestrated with other services, civilian elements of the government, or other nations.

3.  A lack of integrity among senior officers who should know better.

4.  A lack of integrity in Congress, where the focus is on collecting the 5% kick-back from delivered programs, not on actually serving the public interest by insuring affordability, interoperability, sustainability, and utility.

See Also:

Continue reading “USA Spectrum Out of Control & Self-Destructing”

Internet Freedom–The Public Dialog Continues

Advanced Cyber/IO, Analysis, Augmented Reality, Autonomous Internet, Budgets & Funding, Collective Intelligence, Collective Intelligence, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Ethics, Geospatial, info-graphics/data-visualization, InfoOps (IO), International Aid, Journalism/Free-Press/Censorship, Methods & Process, Mobile, Open Government, Peace Intelligence, Policies, Real Time, Reform, Standards, Strategy, Technologies, Threats, Tools
Michel Bauwens

SOURCE: P2P Foundation Category:P2P Infrastructure

This is a specialization of our general Technology section, focusing more explicitely on the ‘true internet' or distributed P2P infrastructures.  It is being updated over the next week or so.

On the overall perspective of the P2P Foundation: What Digital Commoners Need To Do, a meditation on the strategic phases in the construction of a peer to peer world

Help us improve our definition of what a true P2P Infrastructure should be: Defining True P2P Infrastructures

Programmatic Statement for the creation of a world-wide user-controlled network based on a distributed architecture, by Raffael Kéménczy

Projects we find worthty of support:

  1. We Rebuild is a cluster of net activists who have joined forces to collaborate on issues concerning access to a free internet without intrusive surveillance
  2. Open Source Mesh Networking projects monitored by Open Source Mesh
  3. Various strategies to achieve Free Fiber to the home
  4. High Priority Free Software Projects: “The FSF high-priority projects list serves to foster the development of projects that are important for increasing the adoption and use of free software and free software operating systems.”

Projects to decentralize/distribute the internet:

Continue reading “Internet Freedom–The Public Dialog Continues”

Hackers target NASDAQ Site

03 Economy, 07 Other Atrocities, Advanced Cyber/IO, Commercial Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Ethics, Money, Banks & Concentrated Wealth, Tools
By GRAHAM BOWLEY The New York Times

Published: Sunday, February 6, 2011 at 1:00 a.m.

Computer hackers have repeatedly breached the systems of the company that runs the Nasdaq stock exchange in New York but did not penetrate the part of the system that handles trades, according to several law enforcement officials.

Continue reading “Hackers target NASDAQ Site”

Revolution Kickstarted by Facebook Generation

Advanced Cyber/IO, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Cyberscams, malware, spam, Ethics, Journalism/Free-Press/Censorship, Key Players, Methods & Process, Mobile, Officers Call, Open Government, Policies, Real Time, Reform, Strategy, Threats
Mona Eltahawy

We've waited for this revolution for years. Other despots should quail

Change is sweeping though the Middle East and it's the Facebook generation that has kickstarted it

Guardian, 29 January 2011

EXTRACT: Meanwhile, the uprisings are curing the Arab world of an opiate, the obsession with Israel. For years, successive Arab dictators have tried to keep discontent at bay by distracting people with the Israeli-Arab conflict. Israel's bombardment of Gaza in 2009 increased global sympathy for Palestinians. Mubarak faced the issue of both guarding the border of Gaza, helping Israel enforce its siege, and continuing to use the conflict as a distraction. Enough with dictators hijacking sympathy for Palestinians and enough with putting our lives on hold for that conflict.

Read entire long and very thoughtful article….

Phi Beta Iota: The Assisi Peace Summit would do well to integrate the Facebook Generation.  Ms. Eltahawy raises the prospect of Arab youth no longer tolerating an Arab-Israeli conflict (as well as genocide by both Israel and the Arab dictators against the Palestinians).  The question now for us is this: where is the Jewish Facebook Generation?  They need to pay attention and participate.  By the by, this is what Advanced Cyber/Information Operations should be focusing on, not the expensive and fraudulent cyber-terror/cyber-security now a cancer within Cyber-Command circles.

Reference: Advanced Cyber-IO (First Cut)

Advanced Cyber/IO, Computer/online security, Corruption, Cultural Intelligence, DoD, Government, Military, Monographs, Officers Call, Policies, Real Time, Threats

The below was inspired by a close look at the evolving concept of cyber-commands.  In our judgment, LtGen Keith Alexander, USA and those in charge of the various service cyber-commands are headed for spectacularly expensive failure, minor operational successes not-with-standing.  The officers concerned are well-intentioned, precisely like their predecessors who chose to ignore precisely the same insights published in 1994–they simply lack the intestinal fortitude to break with the past and get it right for a change.  What they plan is the cyber equivalent of “clear, hold, build,” and just as mis-guided.  They are out of touch with reality and will remain so.  They will all be happily retired long before the predictable recognition of their failure occurs, and the next generation of young flags will make the same mistakes again…and again…until we get an honest President with an honest Office of Management and Budget (OMB) able to demand and enforce integrity across the board.

Draft Monograph on Cyber-Command

See Also:

Continue reading “Reference: Advanced Cyber-IO (First Cut)”

Gerald Celente: Forecasting Revolution in 2011

01 Poverty, 03 Economy, 08 Wild Cards, Augmented Reality, Collective Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, Journalism/Free-Press/Censorship, Technologies, Videos/Movies/Documentaries

When reform becomes impossible, revolution becomes inevitable.

Phi Beta Iota: This guy is amazing.  Visit his website.

See Also:

Preconditions of Revolution in the USA Today

Gerald Celente: Forecasted Panic in Dec 2007; EIN PDB forecasted crash in Oct 2007

Journal: Denial of Service Attacks on Humanitarian Sites

07 Other Atrocities, 10 Security, 11 Society, Computer/online security, Gift Intelligence, IO Multinational, Non-Governmental
Berto Jongman Recommends...

DDoS Attacks Continue to Plague Human Rights Sites

By: Chloe Albanesius

PC Magazine, 12.22.2010

WikiLeaks and Operation Payback have put distributed denial of service (DDoS) attacks in the news recently, but independent media and human rights Web sites have been battling these attacks on a consistent basis with no easy solution in sight, according to a Wednesday study.

While major sites can fend off a DDoS or recover quickly, smaller sites can be crippled by these attacks, which often hit in conjunction with other attacks like filtering, intrusions, and defacements, according to the Berkman Center for Internet & Society.

“DDoS is an increasingly common Internet phenomenon capable of silencing Internet speech, usually for a brief interval but occasionally for longer,” the report said. “Our report offers advice to independent media and human rights sites likely to be targeted by DDoS but comes to the uncomfortable conclusion that there is no easy solution to these attacks for many of these sites, particularly for attacks that exhaust network bandwidth.”

The report's authors suggest that DDoS attacks will become more common amidst news about similar WikiLeaks and Operation Payback attacks. Even before that, however, DDoS attacks on independent media and human rights sites were quite common during the last year, happening even outside of major events like elections, protests, and military operations.

These sites are being hit with two types of DDoS: application and network. Application attacks exhaust local server resources and can usually be rectified with the help of a skilled system admin. Network attacks, however, exhaust network bandwidth and can usually only be fixed with the (costly) help of a hosting provider.

Read rest of article….