Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

04 Education, 04 Inter-State Conflict, 10 Security, Commerce, Computer/online security, Cyberscams, malware, spam, Government, Military, Misinformation & Propaganda, Secrecy & Politics of Secrecy, Technologies
  • U.S. Strategy: Control The World By Controlling The Internet
    A Chinese Perspective, by Chen Baoguo, August 24, 2010
    In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.

  • Video: “The cyber-threat has been grossly exaggerated” debate between Marc Rotenberg & Bruce Schneier VERSUS Mike McConnell & Jonathan Zittrain

  • China Cyber-army Talk Pulled from Black Hat
    By: Brian Prince 2010-07-15
    A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.

Journal: Open Source Center Not So Open….

Methods & Process, Misinformation & Propaganda, Open Government, Reform, Secrecy & Politics of Secrecy

Open Sourcing U.S. Intelligence Needs

By Curt Hopkins / August 24, 2010 5:10 PM / 6 Comments

Open Source Closed

Before you get excited about joining “the OpenSource.gov community to get access to the latest open source reporting and analysis,” you should know . . . you can't. The OSC is open only to U.S. government employees, contractors, foreign liaisons and employees of the BBC Monitoring Service.

Read Entire Story

Tip of the Hat to Mario Profaca at Facebook.

See Also:

Journal: Just How Important is the WikiLeaks AF Dump?

04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 10 Security, Analysis, Budgets & Funding, InfoOps (IO), Intelligence (government), Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Officers Call, Reform, Secrecy & Politics of Secrecy
Chuck Spinney Recommends

OP-ED COLUMNIST

Kiss This War Goodbye

By FRANK RICH, New York Times,  July 31, 2010

A version of this op-ed appeared in print on August 1, 2010, on page WK8 of the New York edition.

IT was on a Sunday morning, June 13, 1971, that The Times published its first installment of the Pentagon Papers. Few readers may have been more excited than a circle of aspiring undergraduate journalists who’d worked at The Harvard Crimson. Though the identity of The Times’s source wouldn’t eke out for several days, we knew the whistle-blower had to be Daniel Ellsberg, an intense research fellow at M.I.T. and former Robert McNamara acolyte who’d become an antiwar activist around Boston. We recognized the papers’ contents, as reported in The Times, because we’d heard the war stories from the loquacious Ellsberg himself.
. . . . . . .

What was often forgotten last week is that the Pentagon Papers had no game-changing news about that war either and also described events predating the then-current president.

. . . . . . .

The papers’ punch was in the many inside details they added to the war’s chronicle over four previous administrations and, especially, in their shocking and irrefutable evidence that Nixon’s immediate predecessor, Lyndon Johnson, had systematically lied to the country about his intentions and the war’s progress.

Journal: Wikileaks Afghan Collection Assessed

02 Diplomacy, 03 Economy, 04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 09 Terrorism, 10 Security, Corruption, Government, InfoOps (IO), Intelligence (government), Media, Military, Misinformation & Propaganda

Chuck Spinney Recommends

Below is a good summary of the wikileaks database.  It is also a good example of how the secretive conspiratorial mind, trained in the wilderness of mirrors that is the US intelligence establishment, conjures motivations out of the ether.   The author builds a an inferential case to insinuate the massive leak of intelligence data via the wikileaks website was an orchestrated info-operation aimed at influencing the American polity by building the case for leaving Afghanistan.  Left unsaid, but dangling tantalizingly in the last two paragraphs, is a subtle (and unsubstantiated) suggestion that this leak came from very high levels, perhaps the highest level, of the Obama Administration.  Too clever by a half??????  Chuck

Thousands of reasons to leave

By George Friedman, Asia Times, 29 July 2010

On Sunday, The New York Times and two other newspapers published summaries and excerpts of tens of thousands of documents leaked to a website known as WikiLeaks. The documents comprise a vast array of material concerning the war in Afghanistan. They range from tactical reports from small unit operations to broader strategic analyses of politico-military relations between the United States and Pakistan. It appears to be an extraordinary collection.

Tactical intelligence on firefights is intermingled with reports on confrontations between senior US and Pakistani officials in which lists of Pakistani operatives in Afghanistan are handed over to the Pakistanis. Reports on the use of surface-to-air missiles by militants in Afghanistan are intermingled with reports on the activities of former Pakistani intelligence chief Lieutenant General Hamid Gul, who reportedly continues to liaise with the Afghan Taliban in an informal capacity.

FULL APPRAISAL ONLINE

Related:
Wikileaks Afghanistan files: every IED attack, with co-ordinates

U.S. Blunder in Africa: PlayPumps Not Play

01 Poverty, 12 Water, Civil Society, Commerce, Government, Journalism/Free-Press/Censorship, Media, Misinformation & Propaganda, Non-Governmental
Play becomes work with playpump + eventually no water, no maintenance, and elder women can't use it. See synopsis and watch the Frontline video here

(clips from the synopsis about the Frontline video documentary)
Five years ago, Amy Costello reported a story for FRONTLINE/World. It was about the challenges of getting water in Africa, and a promising new technology called the PlayPump.

After years of covering “bad news” in Africa, she was happy to report a story that seemed to offer something to cheer about. Her story showed how simple it might be for children to pump fresh water just by playing. Behind it all, a South African entrepreneur named Trevor Field.

“A report commissioned by the Mozambique government on the PlayPump that was never released, cited problems with the pumps – women finding it difficult to operate; pumps out of commission for up to 17 months; children not playing as expected on the merry-go-rounds, and maintenance, “a real disaster,” the report said. “

Field had made his career in advertising, but when he heard about this new device, he formed a company and started making PlayPumps himself.

To cover maintenance costs, he proposed selling ads on the sides of the water tower. He said the PlayPump model would be a big improvement over the hand pumps that Africans have struggled with for years.

Continue reading “U.S. Blunder in Africa: PlayPumps Not Play”

Journal: Consumer Group Calls for Hearings on Google Relations with NSA and CIA, Google’s Global Street-Level Survey of Wi-Fi Packet Interceptability

07 Other Atrocities, 09 Justice, 11 Society, Commerce, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Methods & Process, Military, Misinformation & Propaganda, Mobile

Group Calls for Hearings Into Google’s Ties to CIA and NSA

Prisonplanet.com
July 20, 2010

More information has emerged about Google’s relationship with the government and spook agencies (see PR Newswire below). The revelations should come as no surprise.

FULL STORY ONLINE

Consumer Watchdog, formerly the Foundation for Taxpayer and Consumer Rights is a nonprofit, nonpartisan consumer advocacy organization with offices in Washington, DC and Santa Monica, Ca.  Consumer Watchdog’s website is www.consumerwatchdog.org. Visit our new Google Privacy and Accountability Project website: http://insidegoogle.com.

Phi Beta Iota: Goggle has accomplished a great deal, aided in part by CIA and NSA, but also in part by being able to get away with stealing Yahoo's search engine in the early days and hiring the Alta Vista people when HP foolishly killed off that offering.  They have emulated Microsoft in achieving first-rate marketing with second-rate services, and continue to spend $10 million in fantasy cash for every dollar they actually earn.  They are now the Goldman Sachs of the software industry, and that is not a compliment.  It is not possible to understand Google without reading the three deep analytic books on Google by Stephen E. Arnold:

Book One: The Google Legacy–How Google's Internet Search is Transforming Application Software

Book Two:  Google Version 2.0–The Calculating Predator

Book Three:   Google: The Digital Gutenberg

All three books (all downloadable pdfs) are available in The Google Trilogy at a very special price.