Howard Rheingold: Art of Thin Web Collection

Advanced Cyber/IO, Blog Wisdom, Methods & Process
Howard Rheingold

GoogleWebSearchEducation

01 Beyond The First Five Links (Tasha Bergson-Michelson–January 12/13, 2011–1 hour 9 minutes)

02 Tools for Assessing Authority on the Web (Julian Prentice–March 15/16, 2011–50 minutes)

03 Introduction to Maps for Research (Trent Maverick–April 12/13, 2011–1 hour 7 minutes)

04 Writing Successful Queries with Predictive Searching (Tasha Bergson-Michelson–May 4, 2011–57 minutes)

Gathering and Filtering Relevant Content: Introduction to Attensa & the StreamServer

Use Dapper To Create RSS Feeds From Any Page, Including Google Plus Posts

Phi Beta Iota:  Google is “thin web” not deep web.  For deep web other tools are required, such as Deep Web Technologies, and human networks that do pro-active sharing at the C drive level.

Berto Jongman: The Emerging Global Mind

11 Society, Advanced Cyber/IO, Autonomous Internet, Civil Society, Collective Intelligence, Cultural Intelligence, Earth Intelligence, Gift Intelligence, IO Deeds of Peace, Methods & Process, Peace Intelligence, Strategy
Berto Jongman Recommends...

Featured Article

The Emerging Global Mind

Noetic Now, Issue Fourteen, September 2011

by Tiffany Shlain

Fifteen years ago I founded the Webby Awards. I was fascinated by how the Internet was connecting people all over the world in new and unexpected ways. I have also been struck by the many conversations about the problems of our day that view them as separate challenges—whether the environment, women’s rights, poverty, or social justice. It has become increasingly apparent to me that when you perceive everything as connected, it radically shapes your perspective.

The concept of interdependence isn’t new; it’s been around since the dawn of humanity. For two-hundred-thousand years, we’ve been connecting through networks both natural and technological. Interdependence has long been a tenet of Eastern philosophy and indigenous cosmologies. But the recent addition of the Internet has added a new layer, which connects us in a fresh way, giving the world a new type of central nervous system. Something happens in one place, and we can see it, feel it, and do something about it almost instantaneously.

Safety copy below the line (original URL is inconsistent)

Continue reading “Berto Jongman: The Emerging Global Mind”

DefDog: USA as an Occupied Country: Propaganda

Blog Wisdom, Counter-Oppression/Counter-Dictatorship Practices
DefDog

Life in an Occupied Country

Skilluminati, Sep 09, 2011

“Politics will eventually be replaced by imagery. The politician will be only too happy to abdicate in favor of his image, because the image will be much more powerful than he could ever be.” — Marshall McLuhan

Phi Beta Iota:  A compelling portrait of “the narrative” as the ruler of the elite-mass communication is offered.

See Also:

DefDog: PSYOP Reading List for Citizens

Richard Wright: It’s Only Money – Why the IC Continues to Fail & Robert Steele: 10% Grade – A Dishonorable Discharge Needed

03 Economy, 07 Other Atrocities, 10 Security, 11 Society, Corruption, Cyberscams, malware, spam, Director of National Intelligence et al (IC), Government, InfoOps (IO), Intelligence (government), IO Impotency
Richard Wright

Its Only Money

The posting of Jim Bamford’s Politico article on today’s Public Intelligence Blog or rather the accompanying comment on it by Robert Steele [Jim Bamford: How 9/11 Fearmongering Grew NSA Into a Very Expensive Domestic Surveillance Monster] identifies the principal problem with the outrageously expensive NSA.  His comment is directly related to earlier comments he made on a Wall Street Journal article written by General Jim Clapper (USAF ret.) the Director of National Intelligence (DNI) [David Isenberg: Jim Clapper Claims Transformation — Robert Steele Comments on Each Misrepresentation]  Steele did a brilliant job of refuting the claims that General Clapper advanced in this article about how much the U.S. Intelligence Community (IC) has improved since 9/11. Yet the article really wasn’t serious to begin with because it obviously was written with the purpose of telling the American people what the General wanted them to know. I am sure it was vetted carefully by his staff and possibly CIA as well.

In the interests of clearing the air a bit I would like to add a couple of comments of my own to supplement those that Steele has made.

In the wake of 9/11 people, who did not know what they were talking about, had a good deal to say concerning the “lack of sharing” within the IC. In point of fact NSA and its technical counterpart the National Geo-spatial [Intelligence] Agency (NGA) are required by law to make their products available to analysts holding the proper clearances in entire IC as well as the President and his National Security Staff. The real lack of sharing was and is between the FBI and CIA. The FBI is unwilling to share because its agents fear damaging ongoing investigations while CIA is unwilling to share because its intelligence officers fear compromising sensitive sources. Had this issue been approached with integrity and directly between the two agencies it could have been resolved years ago.

General Clapper argued that the changed “culture” within the intelligence community had made its members much more efficient at dealing transnational terrorist and criminal organizations.  Neither CIA nor NSA has a clue on how to deal with widely dispersed networked type of organizations. Indeed CIA has yet to build a realistic model of the organizational structure or personnel staffing of al Qaeda. CIA’s current methodology of using ‘targeters’ to find and track individual al Qaeda members is simply doing what the original CIA Counter Terrorism Center (CTC) was doing in the 1990s. Indeed their analytic approach is the same as used during the Cold War with “Soviet Type Armed Forces” (the actual name of a class that many of us attended).

Finally there are Bamford’s article and Steele’s comments on it.  Steele in his comments went right to the heart of the matter by noting that NSA was incapable of processing more than a small percentage of the material it collects on a 24/7 basis. This goes directly to an issue that General Clapper clearly did not wish to discuss in his article: for all the money being poured into NSA specifically and the IC more broadly, how much return in enhanced security are we really getting?  It would not seem to make much sense to continue to spend even more money for collection systems to collect ever more traffic if what is being gathered now can’t be adequately processed.

Robert David STEELE Vivas

Robert Steele:  Emphasis added above.  Richard Wright (Retired Reader at Amazon) focuses on the longest largest divide in the US intelligence community itself, as well as the complete abject failure of analysis as a whole and analysis in relation to crime and terrorism, but it bears mention that other divides are equally unattended to by the current leadership:

1)  The secret world ignores 90% of the full-spectrum threat to obsess on counter-terrorism (badly).

2)  The secret world ignores 90% of the Whole of Government customer base, while badly serving the President and a few senior national security officials.  It is worthless on strategy, acquisition, campaign planning, and tactical real-time actionable intelligence in 183 languages.

3)  The secret world ignores 90% of the relevant sources (in 183 languages) and methods (modern human and machine processing that is commonplace within major insurance and financial companies).

On a scale of 100%, ten years after 9/11, the US secret intelligence world earns a grade of 10% (not just failing, but a dishonorable discharge and shame for all eternity).  The Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) are been impotent since their inception, and appear content to continue in that fashion.

Jim Bamford: How 9/11 Fearmongering Grew NSA Into a Very Expensive Domestic Surveillance Monster

03 Economy, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Corruption, DHS, Director of National Intelligence et al (IC), DoD, Government, InfoOps (IO), IO Deeds of War, IO Impotency, Military
Jim Bamford

September 11 fearmongering grew NSA

Jim Bamford

Politico, 9/8/11

Somewhere between Sept. 11 and today, the enemy morphed from a handful of terrorists to the American population at large, leaving us nowhere to run and no place to hide.

Within weeks of the attacks, the giant ears of the National Security Agency, always pointed outward toward potential enemies, turned inward on the American public itself. The Foreign Intelligence Surveillance Court, established 23 years before to ensure that only suspected foreign agents and terrorists were targeted by the NSA, would be bypassed. Telecom companies, required by law to keep the computerized phone records of their customers confidential unless presented with a warrant, would secretly turn them over in bulk to the NSA without ever asking for a warrant.

. . . . . .

So much intercepted information is now being collected from “enemies” at home and abroad that, in order to store it all, the agency last year began constructing the ultimate monument to eavesdropping. Rising in a remote corner of Utah, the agency’s gargantuan data storage center will be 1 million square feet, cost nearly $2 billion and likely be capable of eventually holding more than a yottabyte of data — equal to about a septillion (1,000,000,000,000,000,000,000,000) pages of text.

. . . . . .

A surveillance system capable of monitoring 10 million people simultaneously this year will be able to monitor 100 million the next year — at probably half the cost. And every time new communications technology appears on the market, rest assured that someone at the NSA has already found a way to monitor it. It’s what the NSA does.

What Church likely never anticipated was the rise of the security-industrial complex, a revolving door between those generating the fears and those profiting from them.

Read full story (3 screens).

Phi Beta Iota:  NSA leadership is blatantly corrupt (this is the same person who destroyed ABLE DANGER rather than share the information with the FBI).  The only good news is that NSA is also inept–it processes less than one percent of what it captures, and is essentially cheating the taxpayer at the same time that it is spying on the taxpayer.  The time has come to create a whole new cadre of ethical leaders who actually understand the new craft of intelligence as decision support (outputs) instead of budget share (inputs), and to slam it back from $90 billion a year toward $20 billion a year.  With the savings the next President can afford to give all displaced personnel a year's salary and a year's re-training toward education, infrastructure, and information-era jobs.

DefDog: PSYOP Reading List for Citizens

04 Education, 07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Book Lists, Civil Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, Government, InfoOps (IO), IO Deeds of War
DefDog

FYI……some good insight…..it is in the very fabric of society….

Towards a Psychological Operations Reading List

Skilluminati Research, 7 September 2011

Defining Psychological Operations is straightforward enough, but
determining where exactly it ends is extremely tricky. The US Department of Defense has infiltrated institutions around the world, they expend billions every year on domestic and foreign propaganda, yet they still only represent a single slice of the spectrum. Intelligence agencies, private think tanks and public corporations are all competing for attentional bandwidth, too. PSYOPS has become ubiquitous, metastasized into Standard Operating Procedure for the entire edifice of Western Culture. Our news and our entertainment, scientific studies, history books, political campaigns and activist movements are all just sponsored messages and paid promotions. From advertisements to astroturfing, everyone's got “desired effects” and everyone's got a “target audience” now.

Read list in context (commentary by the editors).

Phi Beta Iota:  PSYOP succeed when education fails.  Education fails and PSYOP succeed when integrity fails.  This ultimately boils down to Philosophy and the Social Problem (Will Durant, 2008 x 1916).

Below the line:  structured and expanded list with links.

Continue reading “DefDog: PSYOP Reading List for Citizens”

Reference: Secrecy Report 2011 (OpentheGovernment.org)

Civil Society, Government, Open Government, References, Secrecy & Politics of Secrecy
See the report (PDF)

 

Steering Committee Members

  • Steven Aftergood, Federation of American Scientists
  • Gary D. Bass, Bauman Foundation
  • Tom Blanton, National Security Archive
  • Lynne Bradley, American Library Association
  • Danielle Brian, Project on Government Oversight*
  • Kenneth Bunting, National Freedom of Information Coalition
  • Lucy Dalglish, Reporters Committee for Freedom of the Press
  • Kevin Goldberg, American Society on News Editors
  • Robert Leger, Society of Professional Journalists
  • Conrad Martin, Fund for Constitutional Government**
  • Sean Moulton, OMB Watch
  • Michael D. Ostrolenk, Liberty Coalition
  • Reece Rushing, Center for American Progress
  • David Sobel, Electronic Frontier Foundation
  • Anne Weismann, Citizens for Responsibility and Ethics in Washington
  • John Wonderlich, Sunlight Foundation

* chair
** ex-officio member

Thanks to those posting to the National Security Archive Twitter feed!

noble gold