Journal: Twitter Breaks the News

09 Justice, 10 Security, Civil Society, Law Enforcement, Media, Methods & Process, Tools

Full Story Online

Twitter breaks story on Discovery Channel gunman James Lee

Washington Post Staff Writer
Thursday, September 2, 2010

The news broke around 1 p.m. with a few sketchy details. Gunman. Shots. Hostages. Discovery building.

Within minutes, there were photos, including an astonishing one of a man clad in shorts, carrying a rifle and stalking through what looked like an office courtyard.

The news of a gunman at the Discovery Channel's headquarters in Silver Spring indeed traveled fast on Wednesday, but none of it came through radio, TV or newspaper Web sites, at least not at first. As it has with other breaking news events — the landing of a jet on the Hudson River in 2009, the 2008 massacre in Mumbai — the story unfolded first in hiccupping fits and starts on Twitter, the much-hyped micro-blogging service that has turned millions of people into worldwide gossips, opinion-mongers and amateur news reporters.

See Also:
Event Report CORRECTED LINKS: Responding to Real Time Information, Open Systems and the Obama IT Vision [Google-Microsoft Meld]
Graphics: Twitter as an Intelligence Tool
ICT4Peace Kyrgyzstan Crisis Wiki
Journal: DARPA & MIT Discover “Share the Wealth”
Journal: DARPA Tests Twitter
Journal: Free Twitter Rocks, People Rule in Haiti
Journal: Haiti–Twitter Rocks
Journal: IC on Twitter, Still Not Making Sense
Journal: PA & NYPD Criminalize Twitter
Journal: Taming Twitter–Emergence of Baby World Brain?
Journal: Tech ‘has changed foreign policy’
Journal: The Twitter Train Has Left the Station
Journal: Twitter Aggregation Way Cool
Journal: Whither Twitter?
Peace-Building Thru Spotlights on Local Insights
Reference: How to Use Twitter to Build Intelligence
Review: SMS Uprising: Mobile Activism in Africa
Review: The World Is Open–How Web Technology Is Revolutionizing Education
Twitter & SMS Used to Help Election in Kenya
U.S. Geological Survey: Twitter Earthquake Detector (TED)
Worth a Look: CrowdMap (Beta)
Worth a Look: MicroPlace Giving to the Poor
Worth a Look: Talking Plants–Sensor to Shooter

Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

04 Education, 04 Inter-State Conflict, 10 Security, Commerce, Computer/online security, Cyberscams, malware, spam, Government, Military, Misinformation & Propaganda, Secrecy & Politics of Secrecy, Technologies
  • U.S. Strategy: Control The World By Controlling The Internet
    A Chinese Perspective, by Chen Baoguo, August 24, 2010
    In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.

  • Video: “The cyber-threat has been grossly exaggerated” debate between Marc Rotenberg & Bruce Schneier VERSUS Mike McConnell & Jonathan Zittrain

  • China Cyber-army Talk Pulled from Black Hat
    By: Brian Prince 2010-07-15
    A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.

Google: Post-Geographical, Post-National Super-State (Distorted Multi-Plex Eye)

Civil Society, Commerce, Corporations, Privacy, Technologies

Google’s Earth

By WILLIAM GIBSON
August 31, 2010

“I ACTUALLY think most people don’t want Google to answer their questions,” said the search giant’s chief executive, Eric Schmidt, in a recent and controversial interview. “They want Google to tell them what they should be doing next.” Do we really desire Google to tell us what we should be doing next? I believe that we do, though with some rather complicated qualifiers.

Science fiction never imagined Google, but it certainly imagined computers that would advise us what to do. HAL 9000, in “2001: A Space Odyssey,” will forever come to mind, his advice, we assume, eminently reliable — before his malfunction. But HAL was a discrete entity, a genie in a bottle, something we imagined owning or being assigned. Google is a distributed entity, a two-way membrane, a game-changing tool on the order of the equally handy flint hand ax, with which we chop our way through the very densest thickets of information. Google is all of those things, and a very large and powerful corporation to boot.

We have yet to take Google’s measure. We’ve seen nothing like it before, and we already perceive much of our world through it. We would all very much like to be sagely and reliably advised by our own private genie; we would like the genie to make the world more transparent, more easily navigable. Google does that for us: it makes everything in the world accessible to everyone, and everyone accessible to the world. But we see everyone looking in, and blame Google.

Continue reading “Google: Post-Geographical, Post-National Super-State (Distorted Multi-Plex Eye)”

CrisisWatch N°85, 1 September 2010

09 Terrorism, CrisisWatch reports

Five actual or potential conflict situations around the world deteriorated and none improved in August 2010, according to the new issue of the International Crisis Group’s monthly bulletin CrisisWatch, released today.

The situation in Somalia continued to deteriorate as al-Shabaab stepped up its attacks and fighting intensified in Mogadishu. Late in the month the militant Islamist group stormed a hotel in the capital killing at least 35 people, including six MPs; days later four AMISOM peacekeepers were killed when insurgents shelled the presidential palace. There were also worrying developments in the previously stable semi-autonomous region of Puntland when Islamist militants under Mohamed Said Atom clashed with government troops.

Kyrgyzstan’s provisional government was further weakened in August. The month began with an attempted coup and culminated with the mayor of the southern city of Osh – the epicenter of June’s pogroms – defying the President’s orders to resign.

Continue reading “CrisisWatch N°85, 1 September 2010”

Journal: Cognitive Dissonance in Afghanistan

07 Other Atrocities, 08 Wild Cards, Methods & Process, Military
Marcus Aurelius Recommends

The author was “ordered home” within 24 hours (took three days to get him out).  Multiple commentaries suggest that he is actually “understated” in his remarks.  Below the line is balance of article, Small Wars Journal intelligence commentary, and link to illustrated blog with added value.  EDIT of 7 Sep 2010 to add comment from LtCol  Karen Kwiatkowski, USAF (Ret), at end.

Outside View: PowerPoints ‘R' Us

United Press International (UPI)

Aug 24 10:19 AM US/Eastern

KABUL, Afghanistan, Aug. 24 (UPI) — Throughout my career I have been known to walk that fine line between good taste and unemployment. I see no reason to change that now.

Consider the following therapeutic.

I have been assigned as a staff officer to a headquarters in Afghanistan for about two months. During that time, I have not done anything productive. Fortunately little of substance is really done here, but that is a task we do well.

We are part of the operational arm of the International Security Assistance Force commanded by U.S. Army Gen. David Petraeus. It is composed of military representatives from all the NATO countries, several of which I cannot pronounce.

Officially, IJC was founded in late 2009 to coordinate operations among all the regional commands in Afghanistan. More likely it was founded to provide some general a three-star command. Starting with a small group of dedicated and intelligent officers, IJC has successfully grown into a stove-piped and bloated organization, top-heavy in rank. Around here you can't swing a dead cat without hitting a colonel.

Continue reading “Journal: Cognitive Dissonance in Afghanistan”

Journal: Poll on data mining/analytic tools used

Analysis, Methods & Process, Tools

SEE ORIGINAL RESULTS DIRECTLY

34.4  Other (Own Code, Wekis, Zementis, Oracle, SPSS, etc.)

26.4  StatSoft/Statistica

25.6  R

15.7  SAS Enterprise Miner

07.4  KNIME

06.0  MatLab

04.8  RapidMiner

00.4  Rapid-Insight

Tip of the Hat to Vincent Granville at LinkedIn.

See Also:

2001 Porter (US) Tools of the Trade: A Long Way to Go

1988-2009 OSINT-M4IS2 TECHINT Chronology

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

Secrecy News Headlines–Non-Coercive Interviewing

02 China, 03 Economy, 10 Security, Ethics, Geospatial, Strategy, True Cost

Secrecy News

**      DNI ADVISORS FAVOR NON-COERCIVE “INTELLIGENCE INTERVIEWING”
**      RARE EARTH ELEMENTS: THE GLOBAL SUPPLY CHAIN (CRS)
**      THE TWILIGHT OF THE BOMBS

Extract on Torture:

The ISB study notably dissected the “ticking time bomb” scenario that is often portrayed in television thrillers (and which has “captured the public imagination”).  The authors patiently explained why that hypothetical scenario is not a sensible guide to interrogation policy or a justification for torture.  Moral considerations aside, the ISB report said, coercive interrogation may produce unreliable results, foster increased resistance, and preclude the discovery of unsuspected intelligence information of value (pp. 40-42).

Extract on Rare Earths Global Supply Chain:

Rare earth elements — of which there are 17, including the 15 lanthanides plus yttrium and scandium — are needed in many industrial and national security applications, from flat panel displays to jet fighter engines.  Yet there are foreseeable stresses on the national and global supply of these materials.   “The United States was once self-reliant in domestically produced [rare earth elements], but over the past 15 years has become 100% reliant on imports, primarily from China,” a new report (pdf) from the Congressional Research Service observes.  “The dominance of China as a single or dominant supplier […] is a cause for concern because of China’s growing internal demand for its [own rare earth elements],” the report said.