Journal: Third Parties “Crashing” Debates with IT

11 Society, Civil Society, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, InfoOps (IO), IO Sense-Making, Methods & Process
Home Page

John Mertens to Use Multimedia Technology to Debate Candidates Despite Exclusion from the Official Debate, October 4th.

NEW HAVEN, Conn. — Despite earning a ballot line in the 2010 U.S. Senate Race in Connecticut, Dr. John Mertens is not invited to participate in the first post-primary U.S. Senate debate, in New Haven, Conn., Monday, October 04, 2010 from 6:30 – 9:00 p.m., but Mertens has found a way around this roadblock.

Using multimedia technologies to show the televised debate and candidates Blumenthal and McMahon’s answers (live), Mertens and his team will pause to allow candidate Mertens to answer each question before resuming the televised broadcast, giving equal voice to all three candidates. Olwen Logan, publisher of three online local news publications, writer and PR consultant, will be moderating the event.

“John Mertens’ broadcast is a brilliantly creative way of using technology to push back against the duopoly which continues to exclude him and other alternative voices from being heard,” said Christina Tobin, founder and chair of The Free and Equal Elections Foundation. “Voters everywhere deserve to hear from all candidates for public office so they can make educated decisions at the polls.”

“We’re inviting the audience to be citizen journalists during the debate through twitter, and to stay after to connect and discuss issues,” Mertens said.

Read More…

Journal: US Travel Alert–Political and Fraudulent?

08 Wild Cards, 09 Terrorism, 10 Security, 11 Society, Corruption, Government, Intelligence (government), Media, Methods & Process, Misinformation & Propaganda, Officers Call

History:

1)  9-11 known to have been at a minimum allowed to happen.

9-11 Truth Books & DVDs (29)

2)  CIA known to have sponsored terrorism in Philippines, Indonesia, Viet-Nam, and Italy as pretext.

Review: Edward Lansdale’s Cold War (Culture, Politics, and the Cold War) (Paperback)

Reference: US Responsibility for Atrocities in Indonesia

3)  Underpants Bomber very likely to have been a US-Israeli deception operation against the US public and Congress (never mind the Constitution, Bush-Cheney buried it, Obama-Biden have carried on in that tradition).

Journal: Underpants Bomber Saved Worthless NCTC [with other links]

Current Situation:

1)  This rumor has been around before; and the chatter sounds American in origin.

December 20, 2009 Police expect Mumbai-style terror attack on City of London

2)  This time, the “threat” is based on a single US-controlled captive being held in Afghanistan.

Thursday, 30 September 2010 Mumbai-style commando raid plan ‘uncovered in Pakistan'

3)  The threat appears to have been originally aimed at silencing critics of the widespread drone attacks inside Pakistan.

Wed Sep 29 Terror plot in Europe prompted drone strikes

4)  British reinforcement of the US claims suspect

Al Qaida's Mumbai-style attack plot could have been hatched in Rochdale

Our group bottom line: Not even close.  This is very likely a fraud, most certainly over-reaction hyped for political purposes, and the evidence has not been collected, processed, analyzed, and presented properly.    This is bogus.  What is really scary is that in order to “prove” it, a crime against humanity may be ordered, a bombing or shooting spree of sorts using either a false flag recruit set in motion by covert action operators, or a bombing by a contractor such as Xe/Blackwater.

Reference: How to be a data journalist–great links

Blog Wisdom, Methods & Process

Full Story Online (Lots of Links)

How to be a data journalist

Data journalism trainer and writer Paul Bradshaw explains how to get started in data journalism, from getting to the data to visualising it

Guardian data editor Simon Rogers explains how our data journalism operation works

Phi Beta Iota: Most definitely worth a full read–discusses finding data, interrogating data, visualizing data, mashing data…overall a really excellent contribution with many excellent links.

Tip of the Hat to  Pierre Levy at LinkedIn.

Journal: Inspirational Personal Story

11 Society, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Methods & Process, Military, Officers Call

Full Story Online

Wounded in Iraq, double-amputee returns to war

ASHOQEH, Afghanistan – When a bomb exploded under Dan Luckett's Army Humvee in Iraq two years ago — blowing off one of his legs and part of his foot — the first thing he thought was: “That's it. You're done. No more Army for you.”

But two years later, the 27-year-old Norcross, Georgia, native is back on duty — a double-amputee fighting on the front lines of America's Afghan surge in one of the most dangerous parts of this volatile country.

Luckett's remarkable recovery can be attributed in part to dogged self-determination. But technological advances have been crucial: Artificial limbs today are so effective, some war-wounded like Luckett are not only able to do intensive sports like snow skiing, they can return to active duty as fully operational soldiers. The Pentagon says 41 American amputee veterans are now serving in combat zones worldwide.

Phi Beta Iota: This is inspirational, plain and simple.  Our objective, within the Earth Intelligence Network (EIN), is to eventually build the Open Source Center, the Multinational Decision Support Centre, and the global multinational information sharing and sense-making grid, around war veterans who have lost a limb or two.

See Also:

Journal: Leveraging Local Entrepreneurs

Commerce, Commercial Intelligence, Methods & Process, Non-Governmental
Hisham Wyne

Hisham Wyne

Writer, columnist and armchair sociologist

Posted: October 1, 2010 12:35 PM

Social Entrepreneurs and Change in Dubai

An event revolving around the UN Millennium Goals, TEDx Change Dubai, recently gathered three hundred participants at the creek side Dubai Chamber of Commerce. Melinda Gates, wife of billionaire philanthropist and once Microsoft overlord Bill Gates, asked a pertinent question while streaming live from New York.

How is it that Coke can sell 1.5 billion servings daily and dispense to far flung areas that NGOs, Quangos and aid agencies have difficulty reaching with aid or vaccines? It's simple. Coke's distribution takes advantage of local entrepreneurs. NGOs often don't. Entrepreneurs are by nature both disruptive and generative. They distress the fabric of large business through hyper-local knowledge. They nimbly pounce on small market opportunities, or even build them from scratch. They catalyze economic spurts and the birth of cultures and sub-cultures as microcosms of activity appear around them. Their knowledge and drive can often be a powerful catalyst for social improvement.

Read balance of article…

Journal: Underpants Bomber Saved Worthless NCTC

09 Terrorism, 10 Security, Government, Intelligence (government), Methods & Process, Misinformation & Propaganda
Marcus Aurelius Recommends

3 Ways the Underwear Bomber Changed Counterterrorism

December 25, 2009 was a pivotal day for U.S. counterterrorism. Although the airline bombing failed, the reverberations from the attempt are still being felt. Here’s how this incident changed U.S. counterterrorism policy, as told by Mike Leiter, the director of the National Counterterrorism Center.

Popular Mechanics By Joe Pappalardo   September 16, 2010 2:30 PM

Deaf Leading the Blind

1) The incident saved the  Counterterrorism Center's budget.

2) New teams were formed to  chase leads, not write reports.

3) The failed  attack focused the Obama administration on  counterterrorism.

Phi Beta Iota: Click on the photo for the full story at Popular Mechanics.  Above we just list the three “ways,” each of them a perfect outcome for a fraudulent staged “threat” that was almost certainly concocted with Israeli help.  Until the guy video-taping the whole thing from in front is produced, our professional judgment is that the Underpants Bomber was an agent of the US Government doing precisely what this worthless activity wanted: give it a reason, however absurd, to keep on being worthless.   [Covert Operations against a US audience are illegal, but who cares about the Constitution or laws, these days?] NCTC's leader, a decent well-intentioned politically-appointed lawyer who knows nothing relevant, is the poster child for what is wrong with the entire US national security domain.

See Also:

Journal: Underpants Bomber Shines Light on Naked USG–Without Four Reforms, USA Locked in Place

Journal: National Counterterrorism Center (NCTC) Goes from Dumb to Dumber

Journal: The Plot Thickens–Who Benefits?

Journal: Who Over-Rode State to Allow Xmas Bomber?

Journal: Who, Exactly, is Behind Burning Koran?

Journal: Director of National Intelligence Alleges….

Journal: CIA Leads the “Walking Dead” in USA

Journal: CIA’s Poor Tradecraft AND Poor Management

Review: Willful Neglect–The Dangerous Illusion of Homeland Security

Reference: The Open Source Century LINK FIXED

Articles & Chapters, InfoOps (IO), Intelligence (government), International Aid, IO Multinational, IO Sense-Making, Methods & Process
Free Full Access to Feature Article on The Open Source Century

LINK FIXED. Publisher version truncated halfway through, now links to a pdf of all five pages.  Certainly worth a read, including between the lines.  Our critical comments, and the history of opposition, remain extant.

Phi Beta Iota: We missed it but our network did not.  With thanks to one of the 800+ folks that stay in touch, and with thanks to the editors of the World Politics Review, we provide here, by special permission, free full access to the feature article byMICHAEL J. MAZAAR

The Open-Source Century: Information, Knowledge and Intelligence in the 21st Century

Free Full Access Trial Subscription

At the logo below anyone can sign up for a free 30-day trial with full access to a broad range of products and services from World Politics Review.  We thank them for their professional courtesy and recommend them to one and all.

See Also:

2010: Human Intelligence (HUMINT) Trilogy Updated

Search: The Future of OSINT [is M4IS2-Multinational]

2009 DoD OSINT Leadership and Staff Briefings

2008 IJIC 21/3 The Open Source Program: Missing in Action

2005 Steele to Hayden Asking for Naquin Cease & Desist

2004 Modern History of Public Intelligence and the Opposition