Journal: Cyber-Heist 2nd Generation

03 Economy, 04 Education, 10 Security, Civil Society, Collective Intelligence, Computer/online security, Cultural Intelligence, Cyberscams, malware, spam, InfoOps (IO), IO Mapping, Law Enforcement, Mobile, Standards
Marcus Aurelius Recommends

The Great Cyber-Heist

New York Times

By JAMES VERINI

November 10, 2010

Full Story Online

Mid-1990s: Gonzalez, 14, is visited by F.B.I. agents at his high school for hacking into NASA.

Gonzalez,  law-enforcement officials would discover, was more than just a casher. He was a moderator and rising star on Shadowcrew.com, an archetypal criminal cyberbazaar that sprang up during the Internet-commerce boom in the early 2000s. Its users trafficked in databases of stolen card accounts and devices like magnetic strip-encoders and card-embossers; they posted tips on vulnerable banks and stores and effective e-mail scams. Created by a part-time student in Arizona and a former mortgage broker in New Jersey, Shadowcrew had hundreds of members across the United States, Europe and Asia. It was, as one federal prosecutor put it to me, “an eBay, Monster.com and MySpace for cybercrime.”

Read rest of article….

Phi Beta Iota: We opened Hackers on Planet Earth (HOPE) in 1994, making the observation that when the Israeli's captured a hacker they gave him a job, while the US simply kicked them in the teeth and sent them to jail.  We tried to keep Phiber Optic out of jail, and we have for decades been on record comparing hackers to astronauts–full of the right stuff and pushing the edge of the envelope.  No one, including Marty Harris then in charge of the National Information Infrastructure (NII) wanted to listen.  Today the US Government is again ignoring the warnings on the urgency of getting a grip on all information in all languages all the time, and roughly 20 years behind in creating “root” cyber-security.  This article by James Verini is a phenomenal update on what we all knew in the mid-1990's that the US Government is still oblivious to–this is not a problem technology or wanton spending can solve–this is a problem that demands discipline, integrity, intelligence, and sharing.  It is neither possible nor desireable to secure government or military computers in isolation–this is an “all in” smart safe nation challenge.

See Also:

1994 Sounding the Alarm on Cyber-Security

Search: smart nation intelligence reform electoral reform national security reform

Continue reading “Journal: Cyber-Heist 2nd Generation”

Journal: Sacred Music from a Time of Peace Among Religions

11 Society, Civil Society, Cultural Intelligence, Ethics, InfoOps (IO), IO Multinational, IO Sense-Making, Methods & Process
Jon Lebkowsky Home

From Jerusalem to Cordoba

Here’s a press release for a performance I’m co-producing with Scoop Sweeney:

AUSTIN – Catherine Braslavsky and Joseph Rowe will bring their musical performance, “From Jerusalem to Cordoba,” from Paris to Austin on December 3, 7pm at St. David’s Episcopal Church, Bethell Hall, 301 E. 8th St., Austin, 78701-3280. The performance is a celebration of the musical and mystical traditions in and around the Mediterranean, from ancient Judaism and Paganism, to medieval Christianity and Islam. It features ancient and original music sung in Hebrew, Aramaic, Latin, Greek, Medieval Spanish, Occitan, and Arabic. Instrumental accompaniment includes Middle Eastern percussion, oud, dulcimer, Tibetan bowls, Indian tampura, and African mbira.

The performance is built on short poetic and narrative texts that include both original material and quotations from Hildegard of Bingen, Meister Eckhart, Ibn ‘Arabi, Yehuda Halevi, etc. The narrative thread woven through the performance evokes a rarely-perceived common ground, and an alternative view of sacred traditions which have so often been in conflict. Braslavsky and Rowe have presented this performance at venues throughout Europe.

The Italian newspaper La Republicca describes the performance as “fascinating… with great spiritual power.” Author Jacques Attali describes it as “A remarkably successful voyage in sound, depicting those rare times when Jews, Christians and Muslims have lived together in peace and dialogue.” Rev. Lauren Artress, Canon at Grace Cathedral in San Francisco, calls it “uplifting and inspiring,” and notes that “Catherine and Joseph are truly gifted musicians. Allow them to enrich your life.” Jon Lebkowsky in Wired Magazine described the music as “…at once new, traditional, and transcendent. … chants and chant-like original compositions powerfully realized as invocations of the human essence — whether it be the soul, spirit, or consciousness — in its ascent.

Taking Place in Austin, more details…..

Phi Beta Iota: This makes the cut for three reasons.  First, Jon is selective about what he sends out.  Second, holistic analysis and understanding must of necessity include music and art–the Western tradition has destroyed the role of the humanities and in so doing, committed sacrilige with science.  Finally, faith is also a part of conscious evolution, and absent its full integration into any intellectual traditional, you end up with fundamentalist idiots doing grave damage within and among communities.  Religion is at its most gifted when it is a vibrant part of the cultural tradition and used to transfer the lessons of civilization from one generation to the next–starting with the Golden Rule.

See Also:

Graphic: Information Operations (IO) Cube

Review: Empire of Illusion: The End of Literacy and the Triumph of Spectacle

Review: Mapping the Moral Domain: A Contribution of Women’s Thinking to Psychological Theory and Education

Review: Consilience–the Unity of Knowledge

Review: Integral Consciousness and the Future of Evolution

Review: Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of Evolution

Review: Not by Genes Alone: How Culture Transformed Human Evolution

Review: Philosophy and the Social Problem–The Annotated Edition

Reference: Changing the Game

About the Idea, Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, Geospatial, info-graphics/data-visualization, InfoOps (IO), Methods & Process, Mobile, Officers Call, Open Government, Policies, Policy, Real Time, Reform, Threats, Tools
Tom Atlee

ARE WE READY TO CHANGE THE GAME YET?

by Tom Atlee

Some people say Gandhi was about nonviolence. And he was.

But he is significant for something else that I believe is far more important:

He changed the game.

With no one's permission, he reconfigured the playing field of colonialism to a higher Game in which everything the British did in their smaller, narrower game backfired on them. Prisons, guns, threats and bureaucracies of control not only ceased to work like they used to, but actually generated more power for Gandhi's world-changing Game.

Gandhi's Game involved, in his words, “experiments in Truth” — a search for Truth, a bigger Truth, a common inclusive Truth, a win-win Truth in every situation. The British — and even many of Gandhi's compatriots — were not aligned to that Truth. They wanted victory, control, and righteousness. These things trapped them in their smaller game until, one by one, and sometimes wholesale, Gandhi's commitment to Truth won their hearts and minds — and Shift happened.

Continue reading “Reference: Changing the Game”

Reference: How Voters Can UNRIG the Two-Party Shell Game

11 Society, Analysis, Augmented Reality, Blog Wisdom, Budgets & Funding, Civil Society, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), Mobile, Open Government, Real Time, Reform, Strategy
Nancy Bordier

How Voters Can Unrig the 2012 Elections with Transpartisan Voting Blocs and Electoral Coalitions

Voters did not get what they said they wanted from the 2010 elections. In fact, they got the opposite because the two major parties rigged the elections.

The parties have been rigging elections for decades by gerrymandering election districts and passing campaign financing and election laws that prevent third party candidates from beating major party candidates.

These rigged elections give voters no choice but to vote for one of the two major parties. So voters do the only thing they can do, which is to routinely kick out the major party incumbents in the futile hope that the new major party candidates they elect will not flout their will to the same degree. But regardless of which party candidates they vote for, they get roughly the same policies. These typically sacrifice voters' interests to the special interests that fund lawmakers' electoral campaigns.

Unless voters are empowered to put an end to rigged elections before the 2012 elections, using mechanisms like the one proposed below, the middle class and working Americans will be ruined financially by the lawmakers and special interests that are enabling the business and financial sector to take more than their fair share of national income.

Continue reading “Reference: How Voters Can UNRIG the Two-Party Shell Game”

Journal: Financial Intelligence Matters….

02 China, 03 Economy, 04 Inter-State Conflict, 06 Russia, 07 Other Atrocities, 09 Justice, 10 Security, Commerce, Commercial Intelligence, Cyberscams, malware, spam, Government, InfoOps (IO), Intelligence (government), Law Enforcement, Military, Peace Intelligence, Standards
Richard Wright

This article by Bill Gertz needs to be seen in perspective.  During the Cold War the Soviet Union as well as a number of other countries, including China were constantly engaged in trying to acquire U.S. Technology of all types through various means from industrial espionage to bribery.  The U.S. Department of Defense (DOD) was extremely concerned about this and the subject of illicit ‘international technology transfer’ to the Soviet Bloc (as well as a few other countries) generated numerous DOD requirements to such agencies as NSA and CIA. Much of the urgency of these requirements was downgraded precipitously when the Cold War ended. Also the number of incidents of foreign powers trying to acquire U.S. technology has declined in the 21st Century for a very sinister reason: the U.S. is no longer the sole leader in the research and development of advanced technologies that it was after WWII. Although incidents still occur, as the Chinese Huawei example shows, they are much less common than once was the case.  So DOD no doubt does not see the need for the same emphasis on loss of U.S. origin technology.

Yet financial intelligence is more than technology loss it also involves major illicit financial operations, such as money laundering, and financial operations in support of espionage and terrorism against U.S. interests. This of course includes the financial infra-structure supporting al Qaeda. If Ferguson is shutting this effort down as well he is making an unbelievable mistake.

This incident is symptomatic of an Intelligence System that is indeed out of control. In the absence of a viable strategic plan for intelligence collection, analysis, and production, every time some new crises occurs the U.S. Intelligence Community (IC) resembles an ant hill that somebody has just stepped on. In the absence any real leadership or clearly defined purpose, the big four of the IC (CIA, DIA, NGA, and NSA) will continue to waste billions of dollars for minimal returns while resisting an efforts at meaningful reforms. At the same time the IC institutional bias against using non-classified (open) source information will ensure that they will only be able to provide very small windows that are of only limited usefulness to decision makers. What a way to go!

Phi Beta Iota: We are truly surprised that someone of Jim Clapper's caliber would allow an Acting Undersecretary no one has ever heard of to be named Acting in the first place; or that such an individual would do something this dumb without clearance from the DNI.  There are a couple of variations on a theme:  a) Clapper wants to make it obvious that Treasury is in enemy hands and DoD wants nothing to do with Treasury intelligence which does not exist–Treasury, like Energy and the other non-national security departments are patronage stove-pipes receiving direction from ideological idiots–they don't do “evidence-based” policy;  b) Clapper is finally thinking about holistic intelligence in support of Whole of Government, and having DoD drop financial intelligence is a preamble to elevating the Financial Intelligence Center in some manner.  On balance, as much as we admire the DNI, we think he has blown it–he will not accomplish anything consequential in the next few years by continuing to do the wrong things righter, and that is a shame, because so much could be accomplished in a mere 90-180 days, if he would empower those with the right mind-set to do the right things, which is to say, M4IS2 simultaneously with Whole of Government intelligence-support operations and the creation of a Smart Nation.

See Also:

2010: Human Intelligence (HUMINT) Trilogy Updated

Journal: Intelligence Out of Control

02 China, Analysis, Augmented Reality, Budgets & Funding, Collective Intelligence, Commerce, Government, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, Methods & Process, Military, Officers Call, Peace Intelligence, Policies, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Threats
Marcus Aurelius Recommends

IMHO, ill-advised.

Washington Times
November 11, 2010
Pg. 10

Inside The Ring

By Bill Gertz

Financial intel killed

The Pentagon's intelligence directorate is killing off one of its most strategically important mission areas: monitoring efforts by foreign governments to buy U.S. firms and technology, such as the multiple efforts by China's military-linked equipment company Huawei Technologies to buy into the U.S. high-technology sector.

Defense officials tell Inside the Ring that Thomas A. Ferguson, acting undersecretary of defense for intelligence (USDI) and a former Defense Intelligence Agency (DIA) space analyst, initiated the dismantling of the financial-threat intelligence monitoring.

Read rest of the article….

Phi Beta Iota: US Intelligence is out of control–as good as some of the leaders are in terms of diversity of experience within the OLD system, they simply do not have the mind-set nor the authorities to restructure intelligence to the point that it can meet all appropriate needs.  The person ostensibly responsible for strategy, a CIA body, has just been made deputy director of DIA, and we have no doubt that a “strategy” exists that might ultimately turn DIA into the analysis center and CIA into a collection management center (while NSA becomes the all-source processing center, all as outlined in Chapter 13 of ON INTELLIGENCE: Spies and Secrecy in an Open World) as well as all subsequent books such as INFORMATION OPERATIONS: All Information, All Languages, All the Time, this is all too little, too slow, too incoherent, and too expensive.  An Open Source Agency (OSA) under diplomatic auspices, and a voluntary shift of $200 billion from Program 50 to Program 150 as a lure for Newt Gingrinch coming into the 2012 coalition cabinet under Obama running as an Independent (miracles do happen), are both essential.

See Also:

2010: Human Intelligence (HUMINT) Trilogy Updated

Reference: A Path Toward Open Government

Analysis, Augmented Reality, Budgets & Funding, Collective Intelligence, Computer/online security, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Journalism/Free-Press/Censorship, Methods & Process, Open Government
Six Pages Online

Phi Beta Iota: This is one of the most balanced sensible white papers from a vendor it has been our pleasure to encounter.  Taken in context of Microsoft thinking about buying Adobe after failing to see the value of Sun's Open Office, this white paper merits broad appreciation against the possibility that Adobe could become the Context & Content Division that Microsoft does not have and will not have under Steve Ballmer now that Ray Ozzie has given up on Microsoft and moved on.

See Also:

Graphic: One Vision for the Future of Microsoft

2010 Reference: 5 Lessons From Outgoing Microsoft Software Architect Ray Ozzie