Reference: Logistics Oversight as an Information Operations (IO) Mission

Articles & Chapters, Computer/online security, Cultural Intelligence, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Methods & Process, Military, Officers Call, Peace Intelligence, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Threats

David IsenbergDavid Isenberg

Posted: December 21, 2010 11:59 PM

Huffington Post

Can't Anyone at DoD Do Oversight? Anyone at All?

The perennial issue regarding private military security contractors is the degree to which they are subject to effective oversight. In that regard there is only one item in today's news worth looking at. That is the report issued by the House Subcommittee on National Security and Foreign Affairs, chaired by John F. Tierney (D-MA). The Majority staff report is titled, Mystery at Manas: Strategic Blind Spots in the Department of Defense's Fuel Contracts in Kyrgyzstan. The report culminates an eight-month investigation into the Department of Defense's multi-billion dollar aviation fuel contracts at the Manas Transit Center in Kyrgyzstan.

Reminding one of the famous line by 1st Lieutenant Milo Minderbinder in Joseph Heller's famous Catch-22 novel, “We're gonna come out of this war rich!” the report found that to keep U.S. warplanes flying over Afghanistan, the Pentagon allowed a “secrecy obsessed” business group to supply jet fuel to a U.S. air base in Kyrgyzstan, turning a blind eye to an elaborate fraud involving fuel deliveries from Russia.

. . . . . . .

But the fuel was being bought by the Pentagon for shipment to the American airbase in Manas, Kyrgyzstan, and from there on to Afghanistan, the report said. Once Russian officials discovered the true identity of the recipient, they cut off supplies, creating a major logistical headache for United States military commanders.

That breakdown forced a major redrawing of supply routes into Afghanistan for jet fuel, which is in chronically short supply in landlocked Afghanistan. It also touched off a major behind-the-scenes diplomatic effort by the Obama administration to rebuild the fuel lines.

Read the complete very well-presented and documented article….

Phi Beta Iota: David Isenberg, author of Shadow Force: Private Security Contractors in Iraq, has become a valuable oversight contributor with respect to the out-of-control acquisition system on top of the out-of-control Private Military Contractor (PMC) system.  When reliability and redundancy matter, any military force that does not understand its supply chain timelines, costs, and geospatial realities down to the RFID level, as well as the vulnerabilities to disruption, is begging for a major hit.  The Information Operations (IO) domain appears poised for a major advance, integrating intelligence, logistics, operations, and civil affairs information in a manner never before attempted–with the supplemental value of placing Human Intelligence (HUMINT) in proper relationship to Cyber-Security, i.e. 70-30 or thereabouts (some would say 80-20).  Make this multinational, and it will be a game changer.  This is one reason the Office of the Inspector-General is one of the fifteen slices of HUMINT that must be managed by IO.

See Also:

Continue reading “Reference: Logistics Oversight as an Information Operations (IO) Mission”

Journal: NSA Assumes It Has Been Compromised…Correct!

Computer/online security, InfoOps (IO), Intelligence (government), Methods & Process, Open Government, Reform, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Waste (materials, food, etc)

U.S. Code-Cracking Agency Works As If Compromised. The U.S. government's main code-making and code-cracking agency now works on the assumption that foes may have pierced even the most sensitive national security computer networks under its guard.

“There's no such thing as ‘secure' any more,” Debora Plunkett of the National Security Agency said on Thursday amid U.S. anger and embarrassment over disclosure of sensitive diplomatic cables by the website WikiLeaks.

“The most sophisticated adversaries are going to go unnoticed on our networks,” she said.

Plunkett heads the NSA's Information Assurance Directorate, which is responsible for protecting national security information and networks from the foxhole to the White House.

“We have to build our systems on the assumption that adversaries will get in,” she told a cyber security forum sponsored by the Atlantic and Government Executive media organizations.

The United States can't put its trust “in different components of the system that might have already been violated,” Plunkett added in a rare public airing of NSA's view on the issue. “We have to, again, assume that all the components of our system are not safe, and make sure we're adjusting accordingly.”

The NSA must constantly fine tune its approach, she said, adding that there was no such thing as a “static state of security.”

More than 100 foreign intelligence organizations are trying to break into U.S. networks, Deputy Defense Secretary William Lynn wrote in the September/October issue of the journal Foreign Affairs. Some already have the capacity to disrupt U.S. information infrastructure, he said. Plunkett declined to comment on WikiLeaks, which has started releasing a cache of 250,000 diplomatic cables, including details of overseas installations that officials regard as vital to U.S. security.

Official have focused publicly on Army Private Bradley Manning, who is being detained at a Marine Corps base in Quantico, Virginia, as the source of the leak.

NSA, a secretive Defense Department arm that also intercepts foreign communications, conceives of the problem as maintaining the availability and assuring the integrity of the systems it guards, rather than their “security,” she said.

NSA – which insiders jokingly used to say referred to “No Such Agency” – also focuses on standardization and auditing to hunt for any intrusions, Plunkett said. She referred to the development of sensors for eventual deployment “in appropriate places within our infrastructure” to detect threats and take action against them.

Mike McConnell, a retired Navy vice admiral who headed the NSA from 1992 to 1996, told the forum he believed no U.S. government network was safe from penetration.

A third-party inspection of major computer systems found there was none of consequence “that is not penetrated by some adversary that allows the adversary, the outsider, to bleed all the information at will,” said McConnell, director of national intelligence from 2007 to 2009 and now leader of the intelligence business for the Booz Allen Hamilton consultancy.[Wolf/Reuters/18December2010]

Phi Beta Iota: In 1992 NSA knew that shrink-wrapped hardware and software coming across its loading dock was pre-compromised with both hardware and software viruses, Trojan Horse backdoors, and so on.  In 1994 the National Information Infrastructure “leadership” refused to address the need for a $1 billion a year national cyber-security program.  Since then it has simply gotten worse, with the latest (in the last four years) being the ability of the Chinese to ride the electrical circuits into any computer (think of your Best Buy ethernet extender that uses the wiring as a pass through).  The good news is that 90% of what we have behind the green and black doors is not really secret or in such obscure minutia as to be immaterial to national security.  What we should be doing, in our view as the proponent for public intelligence, is this:

1.  Default both Whole of Government and Multinational Engagement to unclassified.  Civil Affairs can lead the way with the Joint Civil Affairs Information Management Sytem that feeds the high side everything, but keeps the open system open.

2.  Set a notional limit of 10% of what can be classified secret within any Embassy, roughly 8% for the spies and 2% for everyone else.

3.  Take the most sensitive stuff completely off the electrical grid (the real reason NSA wants its own power station at Fort Meade and in Utah).

4.  Invest one third of the cyber-war budget, whatever it ends up being (probably half), in education & research relevant to all stakeholders, not just the national security community.  It is not possible to have smart safe spies within a dumb unsafe nation.  It's all connected.

Turning away from secrecy is the single best thing we can do as a government, as a military, as a nation.  It will yield productivity and innovation and foreign relations dividends beyond our dreams.

Everybody who's a real practitioner, and I'm sure you're not all naïve in this regard, realizes that there are two uses to which security classification is put: the legitimate desire to protect secrets, and the protection of bureaucratic turf. As a practitioner of the real world, it's about 90 bureaucratic turf; 10 legitimate protection of secrets as far as I am concerned.

Rodney McDaniel, then Executive Secretary of the National Security Council, to a Harvard University seminar, as cited in Thomas P. Croakley (ed), C3I: Issues of Command and Control (National Defense University, 1991). Page 68.

Reference: Quadrennial Diplomacy & Development Review

About the Idea, Communities of Practice, Ethics, History, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, IO Multinational, IO Sense-Making, Journalism/Free-Press/Censorship, Maps, Methods & Process, Officers Call, Open Government, Peace Intelligence, Policies, Real Time, Reform, Strategy, Threats
Document Online

Phi Beta Iota: The US Government continues to be chaotic in part because its civilian leaders simply do not know what they do not know.  They have the best of intentions, but have been promoted into a new world far removed from the world imprinted on them in their formative years.  There are four ways to address global engagement needs:

1.  With government employees performing inherently governmental functions.  PROBLEM:  The US Government has become hollow, with most of the experienced personnel scheduled for retirement in 2012 (if they don’t retire we lose what is left of the middle), and the bulk of the population, e.g. at CIA, having less than six years experience and being phenomenally ignorant of the real world.  An inter-agency cadre for D&D does not exist.

2.  With contractors hired to government specifications on a cost plus basis.  This is what killed the Pentagon–decades of engineering responsive to military specifications on a cost plus basis, with no accountability anywhere.  As we have seen in Iraq and elsewhere, individual instances aside, contractors are generally too expensive, very under-qualified, and often a major political risk hazard.  They also loot our qualified manpower–in both intelligence and special forces, we have lost too many good people to bad jobs with too much money.

3.  Multinational government task forces in which we plan, program, and budget for using the US military as a “core force” to provide intelligence, operations (mobility, logistics), and communications, and we default to unclassified information-sharing and sense-making.  This allows culturally and linguistically qualified individuals to work at the highest levels of performance for the lowest per capita cost.

4.  Multinational hybrid task forces in which we plan, program, and budget for using the US military as the “core force” to provide intelligence, operations (mobility, logistics), and communications, and we default to unclassified information-sharing and sense-making.  This increases by a factor of SEVEN the number of culturally and linguistically qualified individuals to work at the highest performance levels for the lowest per capita cost with the greatest possible flexibility in covering all needs–the “eight tribes” (academia, civil society, commercial, government–all levels, law enforcement, media, military, non-governmental) become a “whole” force, using shared information and shared mostly unclassified decision support (intelligence) to achieve both a common view of the battlefield, and to most efficiently connect micro-needs in the AOR with micro-gifts from an infinite range of givers.

The Quadrennial Diplomacy and Development Review is at least 20 years too late.  It means well.  It is both delusional and incomplete.  Delusional because no one part of government can become effective until the Office of Management and Budget (OmB) learns to manage again, and incomplete because State simple does not “get” bona fide multinational operations or recognize the “eight tribes.”  There is a small seed crystal here, one that could flourish if the Department of Defense (DoD)–or any significant element of DoD such as the US Army–were to “flip the tortilla” and recognize that the greatest contribution DoD can make in the next 20 years is to get a grip on reality, get a grip on open spectrum, open source intelligence, and open source software, and serve as the “center” for Whole of Government planning, programming, and budgeting, toward the end of creating a prosperous world at peace via low-cost low-risk multinational hybrid task forces that use information and intelligence as a substitute for wealth, violence, time, and space.

NOTE:  On some systems links above appear to be underlining, they are actually links.

See Also [Broken Link Fixed]:

Continue reading “Reference: Quadrennial Diplomacy & Development Review”

Reference: The Private War of LtCol Tony Shaffer

07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society, Articles & Chapters, Civil Society, Collective Intelligence, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Ethics, Government, Intelligence (government), Methods & Process, Military, Misinformation & Propaganda, Officers Call, Power Behind-the-Scenes/Special Interests
Michael Ostrolenk Recommends...

Shaffer’s book rips the lid off several stories the bureaucrats wanted to suppress: the role of a program named Able Danger in yielding information that could have uncovered the 9/11 plot; Operation Dark Heart, which could have nabbed Al Qaeda’s number two leader; and early indications that Pakistan’s spy agency, the Inter-Services Intelligence, or ISI, actively supported the Taliban. These are the incendiary bombs the censors tried to defuse. And this is the real story of Tony Shaffer’s book.

Playboy Article Online

PDF Copy without Advertising

Phi Beta Iota: The Playboy folks did not do their homework–the destruction of an entire first edition is not unprecendented, it was done by CIA to the first printing (1972) of Col L. Fletcher Prouty's The Secret Team: CIA and Its Allies in Control of the United States and the World (Skyhorse, 2008).  While the title is hyped and the good Colonel was not aware of the over-arching financial crime families that the US Government has secretly supported and in some instances actually spawned from scratch, his general point to the public was clear: what is done in our name under the guise of secrecy is often criminal, generally unconstitutional, and almost always very costly in long-term blood, treasure, and spirit over both the short and the long term.  What is at issue here is straight-forward: either we have a government that works in the public interest and displays integrity at every level, or we do not.  It is not only the political “leaders” who have lost their integrity, but the professional “leaders” as well.  Until the truth of this is understood by the majority of the American people, nothing will change.

See Also:

Reference: The Fraud-Based US Economy

Reference: Mortgage Fraud in Detail

Journal: Wall Street Financial Crime Spree Spins On….

Journal: The Wall Street Pentagon Papers–Biggest Scam In World History Exposed–Are The Federal Reserve’s Crimes Too Big To Comprehend?

Reference: The Fraud-Based US Economy

07 Other Atrocities, 08 Wild Cards, Analysis, Articles & Chapters, Blog Wisdom, Budgets & Funding, Collaboration Zones, Communities of Practice, Congressional Research Service, Corruption, Counter-Oppression/Counter-Dictatorship Practices, General Accountability Office, Intelligence (government), Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Office of Management and Budget, Officers Call, Policies, Power Behind-the-Scenes/Special Interests, Reform, Secrecy & Politics of Secrecy, Strategy, Waste (materials, food, etc)
Chuck Spinney Recommends...

The attached blog,  “Failing to Prosecute Wall Street Fraud Is Extending Our Economic Problems,”

is a cut-and-paste accumulation of a variety of outlooks. Most are  based on analyses or accumulated wisdom, but some appear based on hunches, ideologies, etc.  Taken together, however, they paint a horrifying picture of the American political economy and our prospects for the future.  Moreover, that picture does not change materially if you throw half of the pastings away.  While the implications of fraud, per se, are clear, the horrifying picture of what is happening emerges when one tries to generalize on the description.

The anonymous guest author is telling us, in effect, that the neural network of our political-economy — i.e., the information system that provides the wherewithal for implicit and explicit homeostatic guidance and control – – has become so corrupted by fraud and disinformation that a pervasive atmosphere of confusion, menace, fear, mistrust, and alienation is breaking down the system into non-co-operative activities, thereby creating a kind of paralysis of will that, left unchecked, will prolong and deepen our economic crisis. <

One psychologist insightfully likened the situation to trauma and post traumatic stress disorder on a national scale.

Any student of Colonel Boyd's theory [1] of competition and conflict (Patterns of Conflict) and his idea of the OODA loop will immediately recognize the symptoms of confusion, menace, fear, mistrust, and alienation, expressed below.  These are the emergent properties of decision cycles, or Observation – Orientation – Decision – Action (OODA) Loops, that have been folded back inside themselves and have become focused inward and are disconnected from their environments, but connected to some kind of internal dynamic that feeds on itself. Of course, Boyd was discussing military strategy and the art of winning by wrecking his adversary's OODA loops to undermine his adversary's organic cohesion, while preventing his adversary from doing the same thing to him.

Nevertheless, it would be a mistake to dismiss his ideas as applying only to the art of war.  That is because Boyd's aim was to describe in a generalized sense how the human mind works in any conflict involving a clash of independent wills, what the mind's  strengths and weaknesses are, and how these strengths and weaknesses play out in the competition that is the essence of life.

So, it should not be surprising that many politicians, businessmen, and scholars  have recognized that Boyd's general ideas can be tailored to any kind of competition or game (just google “OODA loop”) and have sought gain by exploiting these ideas against others.  Most people, however, instinctively evolve  similar if less well defined ideas, because if Boyd's synthesis of the OODA loop is correct, these dynamics are innate in the evolved wiring of left and right hemispheres of our brains [2], and therefore will exhibit their outward manifestations in repetitive patterns in conflicts over time — which brings back to the tapestry of confusion, menace, fear, mistrust, and alienation and the counter weights that are necessary to overcome them.

Viewed through the lens of Boyd's theory of competition and conflict, the attached blog clarifies one question about the players in the economic game in particular: The information assembled below clearly shows who is the hoser and who is the hosee.

One final point, history has shown that once an nation's political-economic OODA loops become infected by the virus of corrupted information it is very very hard to clean it out.  The hosing will continue unless ruthless action roots it out, otherwise, we will experience continued disintegration ending in a sudden collapse, like what happened to Rome on a grand time scale or to France's Third Republic [3] on a more tangible time scale.

With this background in mind, now read the attached blog and draw you own conclusions about what is needed to re-oreint the corrupted political-economic OODA loops that are leading America to ruin.
——————————–
NOTES:

[1] A short bio of  Boyd and his theories as well as the briefing slides he used to explain his theories can be found in the Boyd folder here.  Robert Coram's excellent biography of Boyd and his theories can be found here.

[2] See, for example, my analysis of how Barack Obama beat Hillary Clinton and John McCain here.

[3]  William L. Shirer's Collapse of the Third Republic, is a case study in how the dry rot of inward focus in the 1930s set France up for its sudden collapse in during the German invasion of May 1940.  His description of how the flow information among the military and political leaders became corrupted during the invasion is a microcosm of how inwardly focused OODA loops, lubricate by menace, mistrust, and fear result inevitably in the breakdown of cohesion, paralysis, chaos, and collapse.

——————————————————-

ATTACHED BELOW THE LINE IN FULL for Information Availability Assurance Into the Future

Failing to Prosecute Wall Street Fraud Is Extending Our Economic Problems

Posted By Guest Author On December 15, 2010 @ 8:30 am In Think Tank

http://www.ritholtz.com/blog/2010/12/failing-to-prosecute-wall-street-fraud-is-extending-our-economic-problems/print/

Continue reading “Reference: The Fraud-Based US Economy”

Reference: Strategic Analytic Model for Creating a Prosperous World at Peace

About the Idea, Analysis, Blog Wisdom, Budgets & Funding, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), IO Mapping, IO Multinational, IO Sense-Making, Key Players, Methods & Process, Policies, Policy, Politics of Science & Science of Politics, Reform, Standards, Strategy, Threats

Robert David SteeleRobert David Steele

Recovering spy, serial pioneer for open and public intelligence

– – – – – – –

Posted: October 14, 2010 06:40 PM

Strategic Analytic Model for Creating a Prosperous World at Peace

Click on Title to Read at Huffington Post and Make Comments.

EDIT of 10 Dec 10 to add missing links and correct typos, this version only.

A Strategic Analytic Model is the non-negotiable first step in creating Strategic Intelligence, and cascades down to also enable Operational, Tactical, and Technical Intelligence.

Continue reading “Reference: Strategic Analytic Model for Creating a Prosperous World at Peace”

Journal: Barack Obama, Colin Powell, and National Security

Budgets & Funding, Government, InfoOps (IO), Intelligence (government), Methods & Process, Military, Officers Call, Open Government, Peace Intelligence, Policies, Policy, Reform, Strategy, Threats
Colin Powell

Will Colin Powell become Barack Obama's next Pentagon chief?

Toby Harnden, The Telegraph UK

4 December 2010

– – – – – – –

Obama's most important decision you haven't heard about — Pentagon leaders

Richard H. Kohn, Christian Science Monitor

6 December 2010

Breaking Down Obama's Cabinet Contenders (2008)

Brian Montopoli, CBSNews

6 November 2008

Phi Beta Iota: The most important decision Barack Obama faces is the fundamental one of whether he wants to lead a government that works for all, or continue to be a meaningless placeholder in the theater of the absurd.  Electoral Reform is the only  thing that matters at this point.  Absent Electoral Reform, his mid-term Cabinet appointments will be meaningless–business as usual.  Colin Powell is as good as it gets if he can reframe his sense of loyalty back to the Constitutional Oath and actually down-size the Pentagon program by a third or more, while shifting $200 billion a year to State, where Senator Chuck Hagel would be well qualified to get the place back to evidence-based policies and coherent strategic planning.  Commerce is a big one–Clyde Prestowitz would be our recommendation, along with Joseph Stiglitz to Office of Management and Budget–see our Virtual Cabinet at Huffington Post.  However stellar the appointments, nothing they do will matter absent fundamental Electoral Reform and a restoration of the integrity not only of the US executive policy process, but of the legislative deliberation process as well.  Only Electoral Reform can create an honest representative Congress.  There are many other critical changes to be made at the highest levels, but ONLY in the context of a restoration of the government being Of, By, and For We the People.  Obama is one single piece of paper away from greatness.  We observe with interest.