1988-2009 OSINT-M4IS2 TECHINT Chronology

Collaboration Zones, Communities of Practice, Methods & Process, Mobile, Policies, Real Time, Threats
Rock ON, Dude
Steele as Wild Card Speaker

Phi Beta Iota: This started as a short list for the various college and university engineering students that have dialed in, but as we got into it, it became more of a “situational awareness” inventory pulling together both technical “solutions” none of which have been integrated yet, and analytic “requirements” none of which have been satisfied yet.

$75 billion a year for secret intelligence, and we still do not have an analytic desktop toolkit, all-source geospatially and historically and cultural astute back office processing, or global reach to all humans, all minds, all the time.  Sucks for us.  Let's see what the Smart Mob can do….

We specifically invite suggestions in the Comments for removing items from this list, or for adding items from within this website or from any other website.  This is now a work zone.  Steele is available to visit any engineering workshop and especially those working on bottom-up clouds like Swarm DPL (transparently scalable distributed programming language).

See also About the Idea, Articles, Briefs, Handbooks, and Historic Contributions. Use the Menu–everything on this stie responds to “OSINT” that is not a good search term.  Rock on!

TOTALLY TECH:

2009 Arnold Google: The Digital Gutenberg

2008 Memoranda: Policy-Budget Outreach Tool

2006  USSOCOM Software List and STRONG ANGEL TOOZL

2006 Morville (UK) Ambient Findability Massive Scale Beyond Your Imagination A Recommedned Approach to Creating the World Brain with Instant Recall

Continue reading “1988-2009 OSINT-M4IS2 TECHINT Chronology”

Journal: Information Security Seven Guiding Principles

Collaboration Zones, Communities of Practice, InfoOps (IO), Methods & Process, Mobile, Policies, Real Time
Full Story Online
Full Story Online

RSA Executives Offer Seven Guiding Principles To Maximize Megatrends Redefining the Information Security Industry

LONDON, Oct. 20 /PRNewswire/ — RSA® CONFERENCE EUROPE 2009 — Building a
systemic security strategy to help organizations better face challenges and exploit opportunities spurred by next generation technology trends was the theme of the opening keynote at the 2009 RSA Conference Europe. In a joint keynote address, Art Coviello and Christopher Young, President and Senior Vice President, respectively, with RSA, The Security Division of EMC (NYSE: EMC), highlighted the need for organizations to develop a systemic security strategy that treats escalating technology trends not as a burden to be lifted, but as
an unprecedented opportunity to improve security and build a more secure information infrastructure.

The seven principles:

Continue reading “Journal: Information Security Seven Guiding Principles”

Journal: Multinational Operations 101

04 Inter-State Conflict, 05 Civil War, 10 Security, Methods & Process, Military

Full Story Online
Full Story Online

Italian Troops Denied Access To Intelligence Reports, Minister Says

Richard Owen  TimesOnline (UK) October 20, 2009

Italy is denied full access to intelligence assessments in Afghanistan, a restriction that affects its troops' ability to operate safely and hampers allied co-ordination, the Italian Foreign Minister said yesterday.

The lack of co-ordination and pooled intelligence between Nato forces was a widespread problem, Franco Frattini said. “We have repeatedly raised this issue,” he added.  …

Mr Frattini said the problem was that intelligence was “the only resource not put at the disposal of everyone”. He said that in Herat, which is under Italian and Spanish command, there was excellent co-ordination with Spanish forces, “but if I want to leave Herat to go to Kandahar it is another matter”.

Continue reading “Journal: Multinational Operations 101”

Journal: How NOT to Decide on Afghanistan

02 China, 04 Inter-State Conflict, 05 Civil War, 05 Iran, 06 Russia, 08 Wild Cards, 10 Security, Ethics, Government, Methods & Process, Military, Policy, Reform, Strategy, Threats
Failure of HUMINT
Failure of HUMINT

The Real Reason for More Troops in Afghanistan

Michael Gaddy LouRockwell.com    October 20, 2009Anyone with a rudimentary knowledge of our quest for empire over the past six decades realizes that Obama’s contemplation of whether to send additional troops to Afghanistan is simply those who control him providing Obama with the opportunity to look “presidential.” The decision to send additional troops was reached prior to the situational comedy of General McChrystal’s leaked “confidential report” to the Washington Post and Obama’s National Security Advisor’s public admonishment of McChrystal’s failure to follow the chain of command. All of this is nothing but a well-rehearsed, though poorly camouflaged hoax. Additional troops will be sent to Afghanistan within a very short period of time and Obama really has no say in the matter. The question is: why?

Continue reading “Journal: How NOT to Decide on Afghanistan”

Journal: Medical Software–Dead on Arrival

07 Health, Civil Society, Ethics, Methods & Process, Mobile

Full Story Online
Full Story Online

Medical Records: Stored in the Cloud, Sold on the Open Market

Kim Zetter October 19, 2009

When patients visit a physician or hospital, they know that anyone involved in providing their health care can lawfully see their medical records. But unknown to patients, an increasing number of outside vendors that manage electronic health records also have access to that data, and are reselling the information as a commodity.   …

Below Fold More and Second Story

Continue reading “Journal: Medical Software–Dead on Arrival”

Journal: Microsoft, Cyber-Security, Syllable, & Integrity

Collaboration Zones, Communities of Practice, Ethics, InfoOps (IO), Methods & Process, Real Time
Microsoft Story Online
Microsoft Full Story Online

Silent Install Firefox Plugin Backfires on Microsoft
posted by Kroc Camen    on Sat 17th Oct 2009 05:27 UTC

Now a security hole has been found in a plugin that Microsoft have  been silently installing into Firefox.  Along with .NET Framework 3.5 SP1, Microsoft have been silently  installing a Windows Presentation Foundation Plugin that allows the embedding of XAML applications (an XML-based UI technology) in web  pages, called XBAP (XAML Web App).   …  The only thing that surprises me more, is that I’m not surprised that  Microsoft could be this incompetent when it comes to the safety of all  users of the web using Windows, regardless if they’re using IE or not.

hackers
Hackers Have the Right Stuff

Continue reading “Journal: Microsoft, Cyber-Security, Syllable, & Integrity”

Journal: True Cost via the Eco-Dollar

Methods & Process, True Cost

Full Story Online
Full Story Online

The Chip Replaces Palladio

Sat, Oct 17 2009

It can now be shown that the energy reaching the Earth from the Sun is actually acting as information. Information and energy are interchangeable in much the same way that energy and matter are interchangeable, and formulas similar to those for matter and energy (E=mc2) can be used to express this interchangeability. Energy is expressing itself as information when it acts in an anti-entropic manner, thereby reducing the randomness in a system or increasing its information. This understanding of information as an anti-entropic activity makes it possible to objectively measure many qualities important to our lives which were formerly measurable only by the crude means of the dollar economy, sentimental attachment, or aesthetic tastes.

Continue reading “Journal: True Cost via the Eco-Dollar”