Aid Data (Beta) fr AidData.org | Tracking Development Finance

01 Poverty, 02 Diplomacy, 02 Infectious Disease, 03 Economy, 04 Education, 06 Family, 07 Health, 11 Society, 12 Water, International Aid, Research resources
website link

AidData attempts to capture the universe of development finance and foreign aid, increase the value of data by providing more descriptive information about development activities, provide data in an accessible format, and strengthen efforts to improve donor and recipient strategic planning and coordination. The PLAID Project — the predecessor to AidData — benefits from significant support given by the Bill & Melinda Gates Foundation, the Hewlett Foundation, Richard and Judy Finch, and the National Science Foundation. PLAID is a partnership of the College of William and Mary and Brigham Young University. Its successor, AidData, is a merger of PLAID and the Development Gateway's Accessible Information on Development Activities (AiDA) Additionally, our work would not be possible without the institutional support of the College of William and Mary, Brigham Young University, and the Development Gateway Foundation.

The AidData team is committed to building an easy-to-use, comprehensive, and timely resource describing the universe of development finance project-by-project, including all grants and loans committed by all major bilateral and multilateral aid donors. We currently have the most comprehensive database on development finance, but have plenty of additional work to do. Better data will help increase aid targeting and coordination, and it will enable better measurement and evaluation of aid effectiveness. AidData is currently developing a publicly-accessible interface that will enable researchers, field workers, and policy makers interested in development finance to access detailed project level data in order to increase transparency, accountability, and effectiveness.

NSA To Monitor Critical Computer Networks Looking For Imperfect Citizens

Civil Society, Commerce, Computer/online security, Corporations, Cyberscams, malware, spam, Government, Secrecy & Politics of Secrecy
article link

(IEEE Spectrum) By: Robert Charette // Thu, July 08, 2010

There is a story in the Wall Street Journal about a new, $100+ million, classified program being run out of the National Security Agency (NSA) that will monitor critical commercial and government infrastructure systems such as electricity grids, nuclear power plants, air traffic control systems and the like in order to detect cyber attacks.

Dubbed “Perfect Citizen,” the NSA hopes the program will hep it fill in what the WSJ calls the “big, glaring holes” in knowledge about exactly how massive, coordinated cyber attacks might negatively affect the US.

The Journal story goes on to quote from an internal email from US defense contractor Raytheon, the program's prime contractor, as saying:

“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security.”

“Perfect Citizen is Big Brother.”

Full article here

Profiling Hackers (or Attackers?)…Further Blurring of lines Between Crime & Hacking

10 Transnational Crime, Cyberscams, malware, spam, Hacking
The Hackers Profiling Project (HPP)

The project aims to improve the response to ICT crime and the transnational organised crime groups that may be involved in it, by outlining the criminal profiles of the different types of hackers, with particular emphasis on their possible involvement in transnational organised crime activities and cyber-terrorism. Through a better understanding of hackers, HPP will facilitate the prevention and countering of ICT crimes and will improve the operational methods that may lead to the identification of computer intruders.
||

85 page overview

This book is an attempt to apply the behavioural science of Criminal Profiling to the hacking realm. Its main objective is to provide a new means of investigation in order to deal with issues related to cybercrime. But there is a lot more to discover…

Computer networks are commonly thought of as unfathomable and invisible, beyond our grasp; a hacker is someone who can still see the joins and this is what makes him interesting though remaining a complex, original and controversial personality.

Aware of the lack of information, which prevents people from adequately understanding the phenomenon of hacking and its many related aspects, the authors' desire is to provide more insight into this realm by telling interesting anecdotes as well as describing bizarre characters that practice hacking and cracking as an art, following different but established ethical models. Providing an in-depth exploration of the hacking realm, focusing on the relation between technology and crime, the authors reveal hidden aspects and many interesting details answering questions like: Who are real hackers? What life does a hacker lead when not on line? Is it possible to determine a hacker's profile on the basis of his behaviour or types of intrusion?

Event Report: 30 Jun-1 July, NYC – ICSR Peace and Security Summit

01 Poverty, 03 India, 04 Indonesia, 05 Civil War, 05 Iran, 08 Wild Cards, 09 Terrorism, 10 Security, 10 Transnational Crime, 12 Water, Academia, Civil Society, Collective Intelligence, Corruption, Cultural Intelligence, Government, History, Law Enforcement, Methods & Process, Military, Non-Governmental, Peace Intelligence, Policy, Strategy, Technologies
Event link

Peace and Security Summit Event Report/Notes

+ Host: London-based International Centre for the Study of Radicalization and Political Violence

+ Partners, Affiliates, Financial Support: National Defense Univ, Rena & Sami David, The Rockefeller Foundation, Public Safety Canada, Center on Global Counterterrorism Cooperation, Centre for Policy Research, New Dehli, Dept of War Studies , King's College London, Inst for Strategic Threat Analysis & Response, Univ of Penn, International Inst for Counter-Terrorism, Interdisciplinary Center Herzliya, Pakistan Inst for Peace Studies, Regional Centre on Conflict Prevention, Jordan Inst of Diplomacy

> Overall, disappointing but reviewing these notes shows there are some good nuggets to take + connect.

BIGGEST SURPRISE = NOT ONE MENTION ABOUT FINANCING OF TERRORISM

Continue reading “Event Report: 30 Jun-1 July, NYC – ICSR Peace and Security Summit”

Journal: PSYOP Dies, Renamed, Still Dead

Augmented Reality, Cultural Intelligence, info-graphics/data-visualization, InfoOps (IO), Military, Officers Call, Peace Intelligence

Marcus Aurelius Recommends

PSYOP has long had problems being PSYOP.  Overseas they often work as “Military Information Support Teams” (MISTs).  If you want to get them significantly spun up, try to discuss with them “perception management” or “deception.”  Try that and they tend to go to ground very quickly.  As for nefarious, spooky, and master manipulators, US PSYOP has always been dwarfed by the British; e.g., “Soldatensender Calais,” documented in Sefton Delmer's “Black Boomerang.”  Personally, I just don't think the current Executive Branch of the USG has the will to play a full-up, full-spectrum game in the national security/foreign policy arena.  Now, soon, or later, we will pay for that in needless loss of life.  Remember always John Stewart Mill:  “War is an ugly thing but not the ugliest of things. …”

“Psychological Operations” Are Now “Military Information Support Operations”

3 July 2010

By Kevin Maurer
Associated Press
July 2, 2010

The Army has dropped the Vietnam-era name “psychological operations” for its branch in charge of trying to change minds behind enemy lines, acknowledging the term can sound ominous.

The Defense Department picked a more neutral moniker: “Military Information Support Operations,” or MISO.

U.S. Special Operations Command spokesman Ken McGraw said Thursday the new name, adopted last month, more accurately reflects the unit’s job of producing leaflets, radio broadcasts and loudspeaker messages to influence enemy soldiers and civilians.

One of the catalysts for the transition is foreign and domestic sensitivities to the term ‘psychological operations’ that often lead to a misunderstanding of the mission,” McGraw said.

Fort Bragg is home to the 4th Psychological Operations Group, the Army’s only active duty psychological operations unit. Psychological operations soldiers are trained at the post.

The name change is expected to extend to all military services, a senior defense official said in Washington. The official, who has direct knowledge of the change, spoke on condition of anonymity because not all services have announced how they will revamp or rename their psychological operations offices.

The change was driven from the top, by Pentagon policymakers working for Defense Secretary Robert Gates. It reflects unease with the Cold War echoes of the old terminology, and the implication that the work involved subterfuge.

The change, however, left some current practitioners of psychological operations cold. Gone is the cool factor, posters to online military blogs said. With a name like MISO, one wrote, you might as well join the supply command.

Alfred H. Paddock, Jr., a retired colonel who was Director for Psychological Operations in the Office of the Secretary of Defense from 1986 to 1988, said the term has always had some baggage and been difficult to explain.

“Somehow it gives a nefarious connotation, but I think that this baggage can be overcome,” said Paddock, who also served three combat tours with Special Forces in Laos and Vietnam.

He said the military was giving in to political correctness by changing the name.

Psychological operations have been cast as spooky in movies and books over the years portraying the soldiers as master manipulators. The 2009 movie “The Men Who Stare at Goats,” staring George Clooney, was about an army unit that trains psychic spies, based on Jon Ronson’s nonfiction account of the U.S. military’s hush-hush research into psychic warfare and espionage.

But the real mission is far more mundane. During the 2003 invasion of Iraq, psychological operations units dropped leaflets urging Iraqis to surrender.

In Vietnam, a psychological operations effort called the Open Arms Program bombarded Viet Cong units with surrender appeals written by former members. The program got approximately 200,000 Viet Cong fighters to defect.

McGraw said the name change was approved by Defense Secretary Robert Gates and Adm. Eric Olson, the Special Operations commander, in mid-June.

Many in the psychological operations community, including Paddock, dislike the new name.

“Military Information Support Operations, or MISO, is not something that rolls off the tip of your tongue,” Paddock said. “It makes it even more difficult for psychological operations personnel to explain what they do. That they still have the capability to employ programs and themes designed to influence the behavior of foreign target audiences.”

Original Source

Phi Beta Iota: PSYOP is 80% fraud, waste, and abuse, and that percentage is kind.  They are still teaching enlisted people at Fort Bragg how to load aircraft propaganda cannisters to deliver leaflets to people who by and large cannot read.  80% of PSYOP billets, dollars, and facilities should be immediately transferred to the Civil Affairs Corps, and used to transition to the regional brigades that include a single multinational Civil Affairs Brigade for each region, along with direct support multinational battalions for military police, combat engineers, medical, and organic land, sea, and air units, all built around a US C4I hub with both regional and donor country (e.g. Nordics) participation.

Journal: Regurgitated Pablum from David Ignatius

06 Russia, 07 Other Atrocities, 10 Security, Commercial Intelligence, Computer/online security, Government, IO Secrets, Law Enforcement, Mobile

Marcus Aurelius Recommends

Washington Post  July 4, 2010 Pg. 19

Keystroke Spies

By David Ignatius

The alleged Russian spy ring is a pleasant summer distraction (Anna Chapman — call your agent!) and a wonderful opportunity to use the phrase femme fatale. But if you want to ponder a 21st-century intelligence puzzle this July 4 weekend, turn your attention to cyber-espionage — where our adversaries can steal in a few seconds what it took an old-fashioned spy network years to collect.

First, though, let's think about what the Russian “illegals” were up to in their suburban spy nests. U.S. intelligence officials think it's partly that the Russians just love running illegal networks. This has been part of their tradecraft since the 1920s, and it enabled many of their most brilliant operations, from Rudolf Abel to Julius and Ethel Rosenberg. The FBI finds it hard to break its cultural habits, and so does Russia's intelligence service, the SVR.

FULL STORY ONLINE

See Also: Neil Stephenson in SNOWCRASH (first edition late 1980's),

Winn Schwartau in Terminal Compromise: Computer Terrorism is a Networked Society and then in INFORMATION WARFARE: Chaos on the Electronic Superhighway (early 1990's), and

top observers in 1994 in a Memorandum to the National Information Infrastructure (NII) “czar.”

Reference: We Lacked the Will (on HUMINT)

DoD, Intelligence (government), Methods & Process

Ladies and Gentlemen:

Attached is somewhat dated; you may or may not have seen.  But the basic message almost certainly remains valid.  For LTG Hughes' part, he was certainly part of the problem.  At the time he retired out of DIA, 15 months or so before 9/11, one of the key operational support elements of his in-house HUMINT organization was commanded by an O-6 who was totally unqualified by temperament and background.  This unfortunate situation was the product of an accommodation arrangement with one of the military Services which was short of O-6 command slots for, shall we say, an asshole geek

SOURCE REDACTED

LtGen Hughes (2001) “We Lacked the Will”

Phi Beta Iota: We don't have leaders.  We have pandering clerks.  What especially irritates us is how they get all holier than thou after retirement.  There isn't a spine connected to a brain in the whole bunch.  Intelligence is a mess–so is the political process, and the policy process simple does not exist, it has never recovered from Dick Cheney.

HUMAN INTELLIGENCE (HUMINT):  All Humans, All Minds, All the Time (SSI, 2010)

ON INTELLIGENCE: Spies and Secrecy in an Open World (AFCEA, OSS, 2000)

See the rest of this web site for the 750+ people with integrity that got it right the first time.

noble gold