Who’s Who in Peace Intelligence: Douglas A. Macgregor

10 Security, 11 Society, Advanced Cyber/IO, Alpha M-P, Analysis, Budgets & Funding, Ethics, Historic Contributions, InfoOps (IO), Methods & Process, Military, Officers Call, Peace Intelligence, Peace Intelligence, Reform, Strategy, Threats
Douglas A. Macgregor
Top Web Hits

Wikipedia Biography with Many Links

The Macgregor Briefings: An Information Age Vision for the U.S. Army

NOTE 1:  HTML versions work, PPT do not

NOTE 2:  Cyber/IO is the enabler of all that he envisions.

Warrior's Rage: The Great Tank Battle of 73 Easting (2009)

Transformation Under Fire: Revolutionizing How America Fights (2004)

Breaking the Phalanx: A New Design for Landpower in the 21st Century (1997)

Journal: DNI Sand-Bagged by Triad & Self

Advanced Cyber/IO, Collaboration Zones, Communities of Practice, InfoOps (IO), Intelligence (government), Key Players, Methods & Process, Officers Call, Policies, Real Time, Reform, Strategy, Threats
Mario Profaca Recommends...

DNI Clapper Needs to Know

The Weekly Standard, DEC 29, 2010

In fact, the more we learn about what the plotters were up to, as well as the efforts to stop them, the more troubling the DNI’s ignorance becomes.

Three facts, in particular, have emerged that make this lapse inexcusable.

First, the State Department says the plotters had the U.S. embassy in London in their sites. On Monday, a Foggy Bottom spokesman confirmed that the embassy was on the plotters’ “targeting list.”

Second, according to the Guardian (UK), the alleged would-be terrorists were arrested “after several months of surveillance and monitoring by police and MI5 officers.”

Third, the UK press has reported that the plotters were, at the very least, inspired by the notorious al Qaeda cleric Anwar al Awlaki. … Awlaki is currently one of the most wanted terrorists in the world.

Read complete article….

Phi Beta Iota: The DNI has been sand-bagged by three people and himself.  Neither John Brennan (kitchen DNI at the White House), Leon Panetta (cheerleader for the CIA), or Michael E. Leiter (lawyer fronting the National Counterterrorism Center) appear to have any direct interest in seeing Jim Clapper succeed.  Unfortunately, Jim Clapper has also sand-bagged himself by accepting “business as usual” and contenting himself with improvements on the margins–doing the wrong things righter.  There is not a single piece of the US secret world that is working the way it should, in part because the entire mess lacks the legitimacy derived from relevance, and in part because the one thing Jim Clapper could have done on his own authority–the creation of an Open Source Center and an embedded Multinational Decision Support Centre–he has not done.   Since the obvious needs to be spelled out, here are the two reasons why the OSC/MDSC are essential: 1) to begin providing the 96% of the decision-support not now provided to everyone including the President but explicitly not provided by classified to anyone below the President including policy, acquisition, and operations action officers; and b) to create the baseline for evaluating the Return on Investment (RoI) for the mis-begotten pieces of the secret world that are not, by any stretch of the imagination, worth the $90 billion a year they are costing us now.  If there were one person among the seniors actually capable of making a difference, it should have been Jim Clapper.  Happy New Year…

See Also:

2010: Human Intelligence (HUMINT) Trilogy Updated

Search: The Future of OSINT [is M4IS2-Multinational]

Building a Constituency for the Director of National Intelligence

Advanced Cyber/IO, Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Communities of Practice, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Key Players, Methods & Process, Open Government, Policies, Reform, Strategy, Threats

Richard Wright

Decision-support (intelligence) is the ultimate objective of information processes. One must carefully distinguish between data which is raw text, signal, or image; information which is collated data of generic interest; and intelligence which is information tailored to support a specific decision…

Robert David Steele Vivas  On Intelligence (AFCEA, 2000)

As noted in an earlier Journal entry (Assessment of the Position of Director of National Intelligence December 27 2010), the Director of National Intelligence (DNI) is an unclaimed orphan among the senior U.S. intelligence managers while the Office of DNI (ODNI) is an unwelcome member of the so-called Intelligence Community (IC).  The current DNI, General James Clapper (USAF ret.) is a good man in a bad job. He conspicuously does not have the ear of his most important constituent, the President of the U.S. (POTUS) or the support of the President’s most important intelligence advisor John Brennan.  So how can the DNI carve out a niche for himself and his office that will enable him to build a Washington D.C. based constituency that may even include the POTUS ?

Even a cursory examination of the principal agencies of the IC, will reveal that none of them are producing strategic intelligence. CIA maintains that its intelligence analysts (most less than five years in service) are too pressed by the need to develop current intelligence to engage in the in depth analysis and research required to produce strategic intelligence. State INR the only other intelligence center really capable of producing strategic intelligence tells much the same story.  The once widely influential National Intelligence Estimates (NIEs), primary vehicles for strategic intelligence, are no longer highly regarded guides to policy formulation.

Yet according to one of the most important thinkers on intelligence analysis, Sherman Kent, strategic intelligence provides, “the knowledge which our highly placed civilians and military men must have to guard the national welfare” (emphasis added). Put another way, strategic intelligence can be described as accurate and comprehensive information that is needed by decision makers to formulate policies or take actions to protect our national interests.

Continue reading “Building a Constituency for the Director of National Intelligence”

Journal: NSA Assumes It Has Been Compromised…Correct!

Computer/online security, InfoOps (IO), Intelligence (government), Methods & Process, Open Government, Reform, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Waste (materials, food, etc)

U.S. Code-Cracking Agency Works As If Compromised. The U.S. government's main code-making and code-cracking agency now works on the assumption that foes may have pierced even the most sensitive national security computer networks under its guard.

“There's no such thing as ‘secure' any more,” Debora Plunkett of the National Security Agency said on Thursday amid U.S. anger and embarrassment over disclosure of sensitive diplomatic cables by the website WikiLeaks.

“The most sophisticated adversaries are going to go unnoticed on our networks,” she said.

Plunkett heads the NSA's Information Assurance Directorate, which is responsible for protecting national security information and networks from the foxhole to the White House.

“We have to build our systems on the assumption that adversaries will get in,” she told a cyber security forum sponsored by the Atlantic and Government Executive media organizations.

The United States can't put its trust “in different components of the system that might have already been violated,” Plunkett added in a rare public airing of NSA's view on the issue. “We have to, again, assume that all the components of our system are not safe, and make sure we're adjusting accordingly.”

The NSA must constantly fine tune its approach, she said, adding that there was no such thing as a “static state of security.”

More than 100 foreign intelligence organizations are trying to break into U.S. networks, Deputy Defense Secretary William Lynn wrote in the September/October issue of the journal Foreign Affairs. Some already have the capacity to disrupt U.S. information infrastructure, he said. Plunkett declined to comment on WikiLeaks, which has started releasing a cache of 250,000 diplomatic cables, including details of overseas installations that officials regard as vital to U.S. security.

Official have focused publicly on Army Private Bradley Manning, who is being detained at a Marine Corps base in Quantico, Virginia, as the source of the leak.

NSA, a secretive Defense Department arm that also intercepts foreign communications, conceives of the problem as maintaining the availability and assuring the integrity of the systems it guards, rather than their “security,” she said.

NSA – which insiders jokingly used to say referred to “No Such Agency” – also focuses on standardization and auditing to hunt for any intrusions, Plunkett said. She referred to the development of sensors for eventual deployment “in appropriate places within our infrastructure” to detect threats and take action against them.

Mike McConnell, a retired Navy vice admiral who headed the NSA from 1992 to 1996, told the forum he believed no U.S. government network was safe from penetration.

A third-party inspection of major computer systems found there was none of consequence “that is not penetrated by some adversary that allows the adversary, the outsider, to bleed all the information at will,” said McConnell, director of national intelligence from 2007 to 2009 and now leader of the intelligence business for the Booz Allen Hamilton consultancy.[Wolf/Reuters/18December2010]

Phi Beta Iota: In 1992 NSA knew that shrink-wrapped hardware and software coming across its loading dock was pre-compromised with both hardware and software viruses, Trojan Horse backdoors, and so on.  In 1994 the National Information Infrastructure “leadership” refused to address the need for a $1 billion a year national cyber-security program.  Since then it has simply gotten worse, with the latest (in the last four years) being the ability of the Chinese to ride the electrical circuits into any computer (think of your Best Buy ethernet extender that uses the wiring as a pass through).  The good news is that 90% of what we have behind the green and black doors is not really secret or in such obscure minutia as to be immaterial to national security.  What we should be doing, in our view as the proponent for public intelligence, is this:

1.  Default both Whole of Government and Multinational Engagement to unclassified.  Civil Affairs can lead the way with the Joint Civil Affairs Information Management Sytem that feeds the high side everything, but keeps the open system open.

2.  Set a notional limit of 10% of what can be classified secret within any Embassy, roughly 8% for the spies and 2% for everyone else.

3.  Take the most sensitive stuff completely off the electrical grid (the real reason NSA wants its own power station at Fort Meade and in Utah).

4.  Invest one third of the cyber-war budget, whatever it ends up being (probably half), in education & research relevant to all stakeholders, not just the national security community.  It is not possible to have smart safe spies within a dumb unsafe nation.  It's all connected.

Turning away from secrecy is the single best thing we can do as a government, as a military, as a nation.  It will yield productivity and innovation and foreign relations dividends beyond our dreams.

Everybody who's a real practitioner, and I'm sure you're not all naïve in this regard, realizes that there are two uses to which security classification is put: the legitimate desire to protect secrets, and the protection of bureaucratic turf. As a practitioner of the real world, it's about 90 bureaucratic turf; 10 legitimate protection of secrets as far as I am concerned.

Rodney McDaniel, then Executive Secretary of the National Security Council, to a Harvard University seminar, as cited in Thomas P. Croakley (ed), C3I: Issues of Command and Control (National Defense University, 1991). Page 68.

Journal: Corporate Hijacking of Cyber-Space

03 Economy, 07 Other Atrocities, 11 Society, Civil Society, Collective Intelligence, Commerce, Commercial Intelligence, Earth Intelligence, InfoOps (IO), Methods & Process, Mobile, Money, Banks & Concentrated Wealth, Policy, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Privacy, Reform, Standards, Strategy, Technologies
Marcus Aurelius Recommends

The Wall Street Journal

The FCC's Threat to Internet Freedom

‘Net neutrality' sounds nice, but the Web is working fine now. The new rules will inhibit investment, deter innovation and create a billable-hours bonanza for lawyers.

Tomorrow morning the Federal Communications Commission (FCC) will mark the winter solstice by taking an unprecedented step to expand government's reach into the Internet by attempting to regulate its inner workings. In doing so, the agency will circumvent Congress and disregard a recent court ruling.

How did the FCC get here?

Read entire article….

Phi Beta Iota: The public is now much more aware that neither of the two political parties can be trusted, and that trust for any given government element, policy, or point of view is contingent on a much deeper examination of bias and motive than many would wish.  There are two sides to this issue, irrespective of the competency and good faith of government: on the one side are the corporations, including Google and Verizon, that wish to hijack cyber-space and claim that they own it.  This will allow them to charge premium prices for access to high-speed services.  On the other are those whose taxes paid for the creation of the Internet in the first place, the US taxpayer–they see the vital importance of open spectrum, open source software, and open source intelligence as the tri-fecta of cyber-freedom.  At OSS '92 John Perry Barlow said that the Internet interprets censorship as an outage, and routes around it.  Our view is that the corporations will succeed in hijacking cyberspace in the near term, but in the mid-term and beyond OpenBTS and other bottom-up public innovation solutions will restore the noosphere to its rightful owners, the human minds that comprise the World Brain.

Reference: Quadrennial Diplomacy & Development Review

About the Idea, Communities of Practice, Ethics, History, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), International Aid, IO Multinational, IO Sense-Making, Journalism/Free-Press/Censorship, Maps, Methods & Process, Officers Call, Open Government, Peace Intelligence, Policies, Real Time, Reform, Strategy, Threats
Document Online

Phi Beta Iota: The US Government continues to be chaotic in part because its civilian leaders simply do not know what they do not know.  They have the best of intentions, but have been promoted into a new world far removed from the world imprinted on them in their formative years.  There are four ways to address global engagement needs:

1.  With government employees performing inherently governmental functions.  PROBLEM:  The US Government has become hollow, with most of the experienced personnel scheduled for retirement in 2012 (if they don’t retire we lose what is left of the middle), and the bulk of the population, e.g. at CIA, having less than six years experience and being phenomenally ignorant of the real world.  An inter-agency cadre for D&D does not exist.

2.  With contractors hired to government specifications on a cost plus basis.  This is what killed the Pentagon–decades of engineering responsive to military specifications on a cost plus basis, with no accountability anywhere.  As we have seen in Iraq and elsewhere, individual instances aside, contractors are generally too expensive, very under-qualified, and often a major political risk hazard.  They also loot our qualified manpower–in both intelligence and special forces, we have lost too many good people to bad jobs with too much money.

3.  Multinational government task forces in which we plan, program, and budget for using the US military as a “core force” to provide intelligence, operations (mobility, logistics), and communications, and we default to unclassified information-sharing and sense-making.  This allows culturally and linguistically qualified individuals to work at the highest levels of performance for the lowest per capita cost.

4.  Multinational hybrid task forces in which we plan, program, and budget for using the US military as the “core force” to provide intelligence, operations (mobility, logistics), and communications, and we default to unclassified information-sharing and sense-making.  This increases by a factor of SEVEN the number of culturally and linguistically qualified individuals to work at the highest performance levels for the lowest per capita cost with the greatest possible flexibility in covering all needs–the “eight tribes” (academia, civil society, commercial, government–all levels, law enforcement, media, military, non-governmental) become a “whole” force, using shared information and shared mostly unclassified decision support (intelligence) to achieve both a common view of the battlefield, and to most efficiently connect micro-needs in the AOR with micro-gifts from an infinite range of givers.

The Quadrennial Diplomacy and Development Review is at least 20 years too late.  It means well.  It is both delusional and incomplete.  Delusional because no one part of government can become effective until the Office of Management and Budget (OmB) learns to manage again, and incomplete because State simple does not “get” bona fide multinational operations or recognize the “eight tribes.”  There is a small seed crystal here, one that could flourish if the Department of Defense (DoD)–or any significant element of DoD such as the US Army–were to “flip the tortilla” and recognize that the greatest contribution DoD can make in the next 20 years is to get a grip on reality, get a grip on open spectrum, open source intelligence, and open source software, and serve as the “center” for Whole of Government planning, programming, and budgeting, toward the end of creating a prosperous world at peace via low-cost low-risk multinational hybrid task forces that use information and intelligence as a substitute for wealth, violence, time, and space.

NOTE:  On some systems links above appear to be underlining, they are actually links.

See Also [Broken Link Fixed]:

Continue reading “Reference: Quadrennial Diplomacy & Development Review”

Reference: The Fraud-Based US Economy

07 Other Atrocities, 08 Wild Cards, Analysis, Articles & Chapters, Blog Wisdom, Budgets & Funding, Collaboration Zones, Communities of Practice, Congressional Research Service, Corruption, Counter-Oppression/Counter-Dictatorship Practices, General Accountability Office, Intelligence (government), Journalism/Free-Press/Censorship, Methods & Process, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Office of Management and Budget, Officers Call, Policies, Power Behind-the-Scenes/Special Interests, Reform, Secrecy & Politics of Secrecy, Strategy, Waste (materials, food, etc)
Chuck Spinney Recommends...

The attached blog,  “Failing to Prosecute Wall Street Fraud Is Extending Our Economic Problems,”

is a cut-and-paste accumulation of a variety of outlooks. Most are  based on analyses or accumulated wisdom, but some appear based on hunches, ideologies, etc.  Taken together, however, they paint a horrifying picture of the American political economy and our prospects for the future.  Moreover, that picture does not change materially if you throw half of the pastings away.  While the implications of fraud, per se, are clear, the horrifying picture of what is happening emerges when one tries to generalize on the description.

The anonymous guest author is telling us, in effect, that the neural network of our political-economy — i.e., the information system that provides the wherewithal for implicit and explicit homeostatic guidance and control – – has become so corrupted by fraud and disinformation that a pervasive atmosphere of confusion, menace, fear, mistrust, and alienation is breaking down the system into non-co-operative activities, thereby creating a kind of paralysis of will that, left unchecked, will prolong and deepen our economic crisis. <

One psychologist insightfully likened the situation to trauma and post traumatic stress disorder on a national scale.

Any student of Colonel Boyd's theory [1] of competition and conflict (Patterns of Conflict) and his idea of the OODA loop will immediately recognize the symptoms of confusion, menace, fear, mistrust, and alienation, expressed below.  These are the emergent properties of decision cycles, or Observation – Orientation – Decision – Action (OODA) Loops, that have been folded back inside themselves and have become focused inward and are disconnected from their environments, but connected to some kind of internal dynamic that feeds on itself. Of course, Boyd was discussing military strategy and the art of winning by wrecking his adversary's OODA loops to undermine his adversary's organic cohesion, while preventing his adversary from doing the same thing to him.

Nevertheless, it would be a mistake to dismiss his ideas as applying only to the art of war.  That is because Boyd's aim was to describe in a generalized sense how the human mind works in any conflict involving a clash of independent wills, what the mind's  strengths and weaknesses are, and how these strengths and weaknesses play out in the competition that is the essence of life.

So, it should not be surprising that many politicians, businessmen, and scholars  have recognized that Boyd's general ideas can be tailored to any kind of competition or game (just google “OODA loop”) and have sought gain by exploiting these ideas against others.  Most people, however, instinctively evolve  similar if less well defined ideas, because if Boyd's synthesis of the OODA loop is correct, these dynamics are innate in the evolved wiring of left and right hemispheres of our brains [2], and therefore will exhibit their outward manifestations in repetitive patterns in conflicts over time — which brings back to the tapestry of confusion, menace, fear, mistrust, and alienation and the counter weights that are necessary to overcome them.

Viewed through the lens of Boyd's theory of competition and conflict, the attached blog clarifies one question about the players in the economic game in particular: The information assembled below clearly shows who is the hoser and who is the hosee.

One final point, history has shown that once an nation's political-economic OODA loops become infected by the virus of corrupted information it is very very hard to clean it out.  The hosing will continue unless ruthless action roots it out, otherwise, we will experience continued disintegration ending in a sudden collapse, like what happened to Rome on a grand time scale or to France's Third Republic [3] on a more tangible time scale.

With this background in mind, now read the attached blog and draw you own conclusions about what is needed to re-oreint the corrupted political-economic OODA loops that are leading America to ruin.
——————————–
NOTES:

[1] A short bio of  Boyd and his theories as well as the briefing slides he used to explain his theories can be found in the Boyd folder here.  Robert Coram's excellent biography of Boyd and his theories can be found here.

[2] See, for example, my analysis of how Barack Obama beat Hillary Clinton and John McCain here.

[3]  William L. Shirer's Collapse of the Third Republic, is a case study in how the dry rot of inward focus in the 1930s set France up for its sudden collapse in during the German invasion of May 1940.  His description of how the flow information among the military and political leaders became corrupted during the invasion is a microcosm of how inwardly focused OODA loops, lubricate by menace, mistrust, and fear result inevitably in the breakdown of cohesion, paralysis, chaos, and collapse.

——————————————————-

ATTACHED BELOW THE LINE IN FULL for Information Availability Assurance Into the Future

Failing to Prosecute Wall Street Fraud Is Extending Our Economic Problems

Posted By Guest Author On December 15, 2010 @ 8:30 am In Think Tank

http://www.ritholtz.com/blog/2010/12/failing-to-prosecute-wall-street-fraud-is-extending-our-economic-problems/print/

Continue reading “Reference: The Fraud-Based US Economy”