Reference: Deep Secrecy–Complete Draft

Articles & Chapters, Collective Intelligence, Communities of Practice, Ethics, InfoOps (IO), Methods & Process, Secrecy & Politics of Secrecy
Abstract & Download
Abstract & Download

Phi Beta Iota: David Pozen, JD Yale 2007, has provided advance access to the complete draft on his paper forthcoming in the Stanford Law Review, and we are both appreciative of this offering, and impressed–deeply impressed–by this seminal work.  At a time when the U.S. “security clearance” system is so totally hosed up (and 70,000 clearances behind) that we might do better with with “spin the bottle,” the author is highlighting the reality that most of the secrecy we buy with $75 billion a year in taxpayer funds is not really that important–not only have others, such as Rodney McDaniel, made it clear that 809% to 90% of all “official” secrecy is about turf protection and budget share rather than national security, but it is administrative secrecy rather than “deep secrecy” that is leveraged by a very few with their own informal system for assigning trust, generally at the expense of the larger mass of uninformed individual who are treated as “collateral damage” that is of little consequence.  The download options are at the top of the linked page

See also:

Continue reading “Reference: Deep Secrecy–Complete Draft”

Journal: Web War II

Communities of Practice, Ethics, InfoOps (IO), Key Players, Methods & Process, Mobile, Policies, Real Time, Threats
Full Story Online
Full Story Online

Web 2.0 Expo: O'Reilly Warns Of Web War

Paul McDougall November 17, 2009

Internet visionary fears an end to openness as Internet rivals consolidate power.

The Web, which began life as an open community where information and tools were freely shared across geographic, political, and social boundaries, is in danger of becoming segmented into a federation of closed camps led by a handful of increasingly powerful vendors, said Internet pundit Tim O'Reilly.”We're heading back into an ugly time,” said O'Reilly, during a keynote address Tuesday at the Web 2.0 Expo in New York City.

O'Reilly said efforts by Google (NSDQ: GOOG), Microsoft (NSDQ: MSFT), Amazon (NSDQ: AMZN), Apple, and other tech vendors—as well as publishers like Rupert Murdoch's Dow Jones—to create closed communities around their products and services are jeopardizing the freedom, and the spirit, of the Web.
Continue reading “Journal: Web War II”

Journal: Cyber-Idiocy Two, Cyber-Sense Zero

InfoOps (IO)
Full Story Online
Full Story Online

U.S. Struggles with ‘Electronic Fratricide’ in Afghanistan

November 17, 2009,  Nathan Hodge

In Afghanistan, western militaries use radio frequency jammers to keep troops safe from remotely-detonated bombs. But those jammers and other gadgets have contributed to a “pollution” of the airwaves so severe that over 200 systems at Afghanistan’s main air base can’t talk to one another.

Full Story Online
Full Story Online

Senate Panel: 80 Percent of Cyber Attacks Preventable

November 17, 2009,  Kim Zetter

If network administrators simply instituted proper configuration policies and conducted good network monitoring, about 80 percent of commonly known cyber attacks could be prevented, a Senate committee heard Tuesday.

Phi Beta Iota: Below the fold see the technical threat slide from Dr. Mich Kabay, and accompanying words, as presented to NSA at the first public conference in Las Vegas in January 2002. We have learned NOTHING since then, and the Office of Management and Budget (OMB) is as catatonic as any so-called “Presidential” oversight agency could be…..our ignorance in the cyber-arena is halfway toward matching our ignorance in the intelligence arena–$75 billion a year for 4% of what the President needs, while we ignore 95% of the open sources in 183 languages we do not speak.  At a more strategic level, we could buy peace three times for what we spend on war.

Continue reading “Journal: Cyber-Idiocy Two, Cyber-Sense Zero”

Journal: $750 Billion Wall Street Scam, Russian Anger, Chinese Intent, We are NOT Making This Up!

Analysis, Budgets & Funding, Commercial Intelligence, Communities of Practice, Ethics, InfoOps (IO), Key Players, Methods & Process, Policies, Policy, Reform, Strategy

EDIT:  See alsoJournal: Wall Street Scam Collateral Damage II

From a Source in Moscow (First Two Paragraphs Only)

Russian trade ministry officials are reporting to Prime Minister Putin today that China is preparing to plunge the United States and European Union into the “dustbin of history” as major World economic powers over their, the West’s, deliberate collapsing of the present Global economic system in order to install their long sought after New World Order.

Full Story Online
Full Story Online

China’s intent to carry out on their threat, these reports say, began this past week when, as perhaps best stated by one American financial analyst, China told the West to go “straight to hell” when the Chinese stated they would deliberately default on Trillions-of dollars in US backed debt security instruments called  OTC  because they were fraudulently created by Western bankers and as such are now considered an “act of war”.

Continue reading “Journal: $750 Billion Wall Street Scam, Russian Anger, Chinese Intent, We are NOT Making This Up!”

Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

Analysis, Collaboration Zones, Communities of Practice, Ethics, InfoOps (IO), Key Players, Mobile, Policies, Real Time, Threats

Full Story Online
Full Story Online

COVER STORY: The Cyberwar Plan  It's not just a defensive game; cyber-security includes attack plans too, and the U.S. has already used some of them successfully.

by Shane Harris Saturday, Nov. 14, 2009

Full Story Online
Full Story Online

14 tech firms form cybersecurity alliance for government Lockheed Martin, top suppliers launch initiative for government market

By Wyatt Kash  Nov 12, 2009

Phi Beta Iota: It is a scam, big time.  The U.S. does not have–outside of our small number of colleagues in Hackers on Planet Earth and the Silicon Valley Hackers/THINK Conference–the brainpower and cummulative skills to fill the Potemkin Center, much less staff a capability with global reach.

Continue reading “Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101”