Washington Post Staff Writer
Thursday, September 2, 2010
The news broke around 1 p.m. with a few sketchy details. Gunman. Shots. Hostages. Discovery building.
Within minutes, there were photos, including an astonishing one of a man clad in shorts, carrying a rifle and stalking through what looked like an office courtyard.
The news of a gunman at the Discovery Channel's headquarters in Silver Spring indeed traveled fast on Wednesday, but none of it came through radio, TV or newspaper Web sites, at least not at first. As it has with other breaking news events — the landing of a jet on the Hudson River in 2009, the 2008 massacre in Mumbai — the story unfolded first in hiccupping fits and starts on Twitter, the much-hyped micro-blogging service that has turned millions of people into worldwide gossips, opinion-mongers and amateur news reporters.
U.S. Strategy: Control The World By Controlling The Internet
A Chinese Perspective, by Chen Baoguo, August 24, 2010
In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.
China Cyber-army Talk Pulled from Black Hat
By: Brian Prince 2010-07-15
A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.
“I ACTUALLY think most people don’t want Google to answer their questions,” said the search giant’s chief executive, Eric Schmidt, in a recent and controversial interview. “They want Google to tell them what they should be doing next.” Do we really desire Google to tell us what we should be doing next? I believe that we do, though with some rather complicated qualifiers.
Science fiction never imagined Google, but it certainly imagined computers that would advise us what to do. HAL 9000, in “2001: A Space Odyssey,” will forever come to mind, his advice, we assume, eminently reliable — before his malfunction. But HAL was a discrete entity, a genie in a bottle, something we imagined owning or being assigned. Google is a distributed entity, a two-way membrane, a game-changing tool on the order of the equally handy flint hand ax, with which we chop our way through the very densest thickets of information. Google is all of those things, and a very large and powerful corporation to boot.
We have yet to take Google’s measure. We’ve seen nothing like it before, and we already perceive much of our world through it. We would all very much like to be sagely and reliably advised by our own private genie; we would like the genie to make the world more transparent, more easily navigable. Google does that for us: it makes everything in the world accessible to everyone, and everyone accessible to the world. But we see everyone looking in, and blame Google.
Five actual or potential conflict situations around the world deteriorated and none improved in August 2010, according to the new issue of the International Crisis Group’s monthly bulletin CrisisWatch, released today.
The situation in Somalia continued to deteriorate as al-Shabaab stepped up its attacks and fighting intensified in Mogadishu. Late in the month the militant Islamist group stormed a hotel in the capital killing at least 35 people, including six MPs; days later four AMISOM peacekeepers were killed when insurgents shelled the presidential palace. There were also worrying developments in the previously stable semi-autonomous region of Puntland when Islamist militants under Mohamed Said Atom clashed with government troops.
Kyrgyzstan’s provisional government was further weakened in August. The month began with an attempted coup and culminated with the mayor of the southern city of Osh – the epicenter of June’s pogroms – defying the President’s orders to resign.
The author was “ordered home” within 24 hours (took three days to get him out). Multiple commentaries suggest that he is actually “understated” in his remarks. Below the line is balance of article, Small Wars Journal intelligence commentary, and link to illustrated blog with added value. EDIT of 7 Sep 2010 to add comment from LtCol Karen Kwiatkowski, USAF (Ret), at end.
Outside View: PowerPoints ‘R' Us
United Press International (UPI)
Aug 24 10:19 AM US/Eastern
KABUL, Afghanistan, Aug. 24 (UPI) — Throughout my career I have been known to walk that fine line between good taste and unemployment. I see no reason to change that now.
Consider the following therapeutic.
I have been assigned as a staff officer to a headquarters in Afghanistan for about two months. During that time, I have not done anything productive. Fortunately little of substance is really done here, but that is a task we do well.
We are part of the operational arm of the International Security Assistance Force commanded by U.S. Army Gen. David Petraeus. It is composed of military representatives from all the NATO countries, several of which I cannot pronounce.
Officially, IJC was founded in late 2009 to coordinate operations among all the regional commands in Afghanistan. More likely it was founded to provide some general a three-star command. Starting with a small group of dedicated and intelligent officers, IJC has successfully grown into a stove-piped and bloated organization, top-heavy in rank. Around here you can't swing a dead cat without hitting a colonel.
The ISB study notably dissected the “ticking time bomb” scenario that is often portrayed in television thrillers (and which has “captured the public imagination”). The authors patiently explained why that hypothetical scenario is not a sensible guide to interrogation policy or a justification for torture. Moral considerations aside, the ISB report said, coercive interrogation may produce unreliable results, foster increased resistance, and preclude the discovery of unsuspected intelligence information of value (pp. 40-42).
Rare earth elements — of which there are 17, including the 15 lanthanides plus yttrium and scandium — are needed in many industrial and national security applications, from flat panel displays to jet fighter engines. Yet there are foreseeable stresses on the national and global supply of these materials. “The United States was once self-reliant in domestically produced [rare earth elements], but over the past 15 years has become 100% reliant on imports, primarily from China,” a new report (pdf) from the Congressional Research Service observes. “The dominance of China as a single or dominant supplier […] is a cause for concern because of China’s growing internal demand for its [own rare earth elements],” the report said.