DefDog: Laser to Detect Improvised Explosive Devices (IED)

07 Other Atrocities, 10 Security, Academia, Corruption, DoD, Government, Intelligence (government), IO Deeds of War, Methods & Process, Military
DefDog

JIEDDO spent north of $1 Billion and climbing and was not able to do what these guys have…..

Researchers Say Laser Could Detect Roadside Bombs

By Chloe Albanesius

PCMag.com, September 19, 2011

Researchers at Michigan State University have developed a laser that could be used to detect roadside bombs, also known as improvised explosive devices (IEDs).

The device is no stronger than a typical presentation pointer, but it has the sensitivity and selectivity to scan large areas and detect the chemicals used in these deadly bombs, which have accounted for about 60 percent of soldier deaths in Iraq and Afghanistan.

Read more….

Phi Beta Iota:  In 1988, when the Marine Corps Intelligence Center (today a Command) was created, Measurements and Signatures Intelligence (MASINT) was just getting started.  The #1 officially-stated Marine Corps requirement for MASINT in 1988 was precisely this: the ability to detect ground explosives at stand-off distance regardless of the containers.  Nearly a quarter century later, and billions–not just one billion–later, the US Government still cannot do this.  This Israelis solved the problem for themselves in the 1960's, using trained dogs that were expendable.  The US Government learned of this solution in 1988, but refused to take it seriously (dogs are not an expensive enough solution).  As General Robert Scales has pointed out, 4% of the force (infantry) takes 80% of the casualties, but receives less than 1% of the funding.  This is, in one word, corruption.  The Department of Defense lacks integrity in every sense of the word.

See  Also:

DefDog: Defense Contractors Start the Big Lie Again–Jobs PLUS Winslow Wheeler Defense Budget Facts RECAP

Reference: 27 Sep MajGen Robert Scales, USA (Ret), PhD

Journal: Reflections on Integrity

Richard Wright: It’s Only Money – Why the IC Continues to Fail & Robert Steele: 10% Grade – A Dishonorable Discharge Needed

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Cyberscams, malware, spam, Director of National Intelligence et al (IC), Government, InfoOps (IO), Intelligence (government), IO Impotency
Richard Wright

Its Only Money

The posting of Jim Bamford’s Politico article on today’s Public Intelligence Blog or rather the accompanying comment on it by Robert Steele [Jim Bamford: How 9/11 Fearmongering Grew NSA Into a Very Expensive Domestic Surveillance Monster] identifies the principal problem with the outrageously expensive NSA.  His comment is directly related to earlier comments he made on a Wall Street Journal article written by General Jim Clapper (USAF ret.) the Director of National Intelligence (DNI) [David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation]  Steele did a brilliant job of refuting the claims that General Clapper advanced in this article about how much the U.S. Intelligence Community (IC) has improved since 9/11. Yet the article really wasn’t serious to begin with because it obviously was written with the purpose of telling the American people what the General wanted them to know. I am sure it was vetted carefully by his staff and possibly CIA as well.

In the interests of clearing the air a bit I would like to add a couple of comments of my own to supplement those that Steele has made.

In the wake of 9/11 people, who did not know what they were talking about, had a good deal to say concerning the “lack of sharing” within the IC. In point of fact NSA and its technical counterpart the National Geo-spatial [Intelligence] Agency (NGA) are required by law to make their products available to analysts holding the proper clearances in entire IC as well as the President and his National Security Staff. The real lack of sharing was and is between the FBI and CIA. The FBI is unwilling to share because its agents fear damaging ongoing investigations while CIA is unwilling to share because its intelligence officers fear compromising sensitive sources. Had this issue been approached with integrity and directly between the two agencies it could have been resolved years ago.

General Clapper argued that the changed “culture” within the intelligence community had made its members much more efficient at dealing transnational terrorist and criminal organizations.  Neither CIA nor NSA has a clue on how to deal with widely dispersed networked type of organizations. Indeed CIA has yet to build a realistic model of the organizational structure or personnel staffing of al Qaeda. CIA’s current methodology of using ‘targeters’ to find and track individual al Qaeda members is simply doing what the original CIA Counter Terrorism Center (CTC) was doing in the 1990s. Indeed their analytic approach is the same as used during the Cold War with “Soviet Type Armed Forces” (the actual name of a class that many of us attended).

Finally there are Bamford’s article and Steele’s comments on it.  Steele in his comments went right to the heart of the matter by noting that NSA was incapable of processing more than a small percentage of the material it collects on a 24/7 basis. This goes directly to an issue that General Clapper clearly did not wish to discuss in his article: for all the money being poured into NSA specifically and the IC more broadly, how much return in enhanced security are we really getting?  It would not seem to make much sense to continue to spend even more money for collection systems to collect ever more traffic if what is being gathered now can’t be adequately processed.

Robert David STEELE Vivas

Robert Steele:  Emphasis added above.  Richard Wright (Retired Reader at Amazon) focuses on the longest largest divide in the US intelligence community itself, as well as the complete abject failure of analysis as a whole and analysis in relation to crime and terrorism, but it bears mention that other divides are equally unattended to by the current leadership:

1)  The secret world ignores 90% of the full-spectrum threat to obsess on counter-terrorism (badly).

2)  The secret world ignores 90% of the Whole of Government customer base, while badly serving the President and a few senior national security officials.  It is worthless on strategy, acquisition, campaign planning, and tactical real-time actionable intelligence in 183 languages.

3)  The secret world ignores 90% of the relevant sources (in 183 languages) and methods (modern human and machine processing that is commonplace within major insurance and financial companies).

On a scale of 100%, ten years after 9/11, the US secret intelligence world earns a grade of 10% (not just failing, but a dishonorable discharge and shame for all eternity).  The Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) are been impotent since their inception, and appear content to continue in that fashion.

Steven Aftergood: Top Secret America–Totally Dysfunctional

Analysis, Commerce, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Government, InfoOps (IO), Intelligence (government), IO Deeds of War, IO Impotency, Methods & Process, Officers Call, Policies, Threats
Steven Aftergood

A SPOTLIGHT ON “TOP SECRET AMERICA”

Most people can vaguely recall that there was once no U.S. Department of Homeland Security and that there was a time when you didn't have to take your shoes off before boarding an airplane or submit to other dubious security practices.

But hardly anyone truly comprehends the enormous expansion of the military, intelligence and homeland security bureaucracy that has occurred over the past decade, and the often irrational transformation of American life that has accompanied it.

The great virtue of the new book Top Secret America by Dana Priest and William M. Arkin (Little Brown, September 2011) is that it illuminates various facets of our secret government, lifting them from the periphery of awareness to full, sustained attention.

Top Secret America, which builds on the series of stories the authors produced for the Washington Post in July 2010, delineates the contours of “the  new American security state.”  Since 9/11, for example, some 33 large office complexes for top secret intelligence work have been completed in the Washington DC area, the equivalent in size of nearly three Pentagons.  More than 250,000 contractors are working on top secret programs.  A bewildering number of agencies – more than a thousand — have been created to execute security policy, including at least 24 new organizations last year alone.  And so on.

But the vast scale of this activity says nothing about its quality or utility.  The authors, who are scrupulous in their presentation of the facts, are critical in their evaluation:

“One of the greatest secrets of Top Secret America is its disturbing dysfunction.”

Continue reading “Steven Aftergood: Top Secret America–Totally Dysfunctional”

Steven Aftergood: Open Source Intelligence Act III

Advanced Cyber/IO, Book Lists, Collaboration Zones, Communities of Practice, Defense Science Board, Director of National Intelligence et al (IC), DoD, Ethics, Hacking, InfoOps (IO), Intelligence (government), Key Players, Mobile, Officers Call, Open Government, Policies, Real Time, Serious Games, Threats, Topics (All Other)
Steven Aftergood

Phi Beta Iota:  Act I was 1988-1993.  Act II was 1993-2011.  Act III began with the publication of NO MORE SECRETS with a Foreword by Senator Gary Hart (D-CO).

Below the line in full (or click on links to originals):

OPEN UP OPEN SOURCE INTELLIGENCE

THE INSTITUTIONALIZATION OF OPEN SOURCE INTELLIGENCE

 

Continue reading “Steven Aftergood: Open Source Intelligence Act III”

Steven Howard Johnson: Reflections on OSINT

Advanced Cyber/IO, Blog Wisdom, Budgets & Funding, Collective Intelligence, Communities of Practice, Cultural Intelligence, Ethics, Hacking, InfoOps (IO), Intelligence (government), Methods & Process, Open Government, Policies, Resilience, Strategy, Threats
Steven Howard Johnson

Phi Beta Iota:  Mr. Johnson is the author of Integrity at Scale, free online, whose many ideas are being integrated into the vision for a Smart Nation Act and the hub of the Smart Nation, an Open Source Agency and global Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing and Sense-Making (M4IS2) network of networks.  He is a party to the on-going push to establish the Open Source Agency and create a more competent and ethical America.

– – – – – – -BEGIN REFLECTIONS- – – – – – –

As I look at the Open Source idea, I find myself experiencing a fair amount of dissonance between a methodological vision of open source intelligence, at one level, and at a very different level, an aspirational vision that sees it as a way of disinfecting a misguided and corrupt set of bureaucracies.

One mission is potentially endorsable by the powers-that-be.  The second mission is not.  Ask people to endorse both and it isn’t likely that either will move forward. If corruption prevention is to be the mission, the open source agency will have to find a home outside of government.  If transparency of intelligence is the mission, then perhaps it can find a home inside government.

My second source of dissonance has to do with design and scale.  Open source intelligence is potentially as vast as all the server farms Google will ever own.  How does a relatively modest site, squeezed in between State and Watergate, ever acquire the heft to handle the challenge?  The scope of the mission and the scope of the agency seem out of sync with the scope of the real estate footprint.

Continue reading “Steven Howard Johnson: Reflections on OSINT”

Video/GoogleTechTalk: The Secret History of Silicon Valley

Academia, Government, Intelligence (government), Military, Videos/Movies/Documentaries, YouTube

The Secret History of Silicon Valley

(From YouTube) How Stanford & the CIA/NSA Built the Valley We Know Today, presented by Steve Blank.

Silicon Valley entrepreneur Steve Blank will talk about how World War II set the stage for the creation and explosive growth of Silicon Valley, and the role of Frederick Terman and Stanford in working with government agencies (including the CIA and the National Security Agency) to set up companies in this area that sparked the creation of hundreds of other enterprises.

Steve Blank spent nearly 30 years as founder and executive of high tech companies in Silicon Valley, most recently the enterprise software firm E.piphany. He has been involved in or co-founded eight Silicon Valley startups, ranging from semiconductors to video games, and personal computers to supercomputers. He teaches entrepreneurship at U.C. Berkeley's Haas School of Business, Columbia University and Stanford's Graduate School of Engineering.

Review: Litigation Under the Federal Open Government Laws 2010 from the Electronic Privacy Information Center

07 Other Atrocities, 10 Security, 11 Society, Advanced Cyber/IO, Civil Society, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Director of National Intelligence et al (IC), DoD, Ethics, Government, InfoOps (IO), Intelligence (government), Law Enforcement, Military, Secrecy & Politics of Secrecy
Amazon Page

Electronic Privacy Information Center (Author), Marc Rotenberg (Editor), Harry A. Hammitt (Editor), Ginger McCall (Editor), John A. Verdi (Editor), Mark S. Zaid (Editor)

5.0 out of 5 stars Critical USEFUL Reference, Handbook, Citizen Manual,August 22, 2011

I'm exploring a major campaign to expose illegal actions across the Defense Office of Hearings and Appeals and the Defense Intelligence Agency in particular, and in talking to the Electronic Privacy Information Center (EPIC) leadership got a chance to understand just how vital and USEFUL this guide is.

Senator Patrick Leahy, co-sponsor of the OPEN Government Act of 2007, and many others are on record as considering this the single most indispensable tool in any citizen's toolkit.

For myself, having seen the capricious, arbitrary, and often unethical and even abusive manner in which DIA Personnel “cooks the books” and manipulates job announcements and screening decisions, and having been personally privy to enormous abuse by the Director of the Defense Office of Hearings and Appeals and a specifc group of his subordinates, consider this manual essential to my own search for justice.

Although I will use it more to inform myself so I can assist the specialist lawyers in making the most of what I know in their probing inquires at DIA and DOHA, I certainly recommend it to any citizen that has a specific concern that is not getting a fair hearing.

I also recommend the publisher and experts that put it together, the Electronic Privacy Information Center (EPIC). Many folks do not realize that they have been one of the leading champions of open government, and have also been one of the leading champions in exposing fraud, waste, and abuse that has been concealed by secrecy.

The US Government, in my view, as a general observation, is out of control and no longer representative of We the People. This is the handbook for citizens to use in holding every branch of the federal government accountable for its misbehavior and its dereliction of duty in failing to represent the public interest as opposed to the interest of its very big stakeholders who are recipients of the tax dollar rather than contributors to the treasury of the Republic.

Arm yourself with this knowledge, and go into battle confident in the righteousness of your cause.

See Also [Amazon book link still broken]:

Piercing the Veil of Secrecy: Litigation Against U.S. Intelligence by Janine Brookner

Vote and/or Comment on Review