Video: Jesse Ventura Rips Wall St & Goldman Sachs

01 Poverty, 03 Economy, 07 Other Atrocities, Civil Society, Commerce, Corruption, Ethics, Government, Money, Banks & Concentrated Wealth, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Videos/Movies/Documentaries

Related:

Review: Griftopia–Bubble Machines, Vampire Squids, and the Long Con That Is Breaking America

See also:
Come Home, America: The Rise and Fall (and Redeeming Promise) of Our Country

The Battle for the Soul of Capitalism
Continue reading “Video: Jesse Ventura Rips Wall St & Goldman Sachs”

WikiLeaks Mindset Growing Far & Wide

Civil Society, Corruption, Ethics, Government, Media, Military, Open Government, Secrecy & Politics of Secrecy

(text fr newsletter)
Get used to the WikiLeaks mindset
“The hacker generation is now employed by government, the military and corporate America, writes George Smith, a senior fellow at GlobalSecurity.org.”

Workforce: Get used to the WikiLeaks mindset

  • By George Smith
  • Jan 26, 2011

George Smith is a senior fellow at GlobalSecurity.org and a writer and commentator on the science and technology of national security.

Back in the early 1990s, I edited an electronic newsletter that dealt with the culture of amateur virus writers — hackers who wrote mobile malware. Julian Assange was a subscriber. This is only to illustrate Assange's bona fides as someone from the original world computer underground, a place where one of the driving philosophies was to reveal the secrets of institutional power.

Once confined to what was considered a computer geek fringe, that ideology is now entrenched. It's no longer an outsider mindset, and it hasn't been for a long time. Now it's inside, with its originators entering middle age. And younger adherents of the philosophy are coming along all the time.

They're everywhere — employed by government, the military and corporate America. And because we have come to the point that the United States is considered by some to be a bad global actor — whether you share that point of view or not — the government is faced with a problem it cannot solve. Its exposure is thought by many to be deserved.

Continue reading “WikiLeaks Mindset Growing Far & Wide”

Reference: Intelligence for the Spirit of Assisi

Advanced Cyber/IO, Budgets & Funding, Collective Intelligence, Collective Intelligence, Commercial Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Earth Intelligence, Ethics, Geospatial, Gift Intelligence, History, info-graphics/data-visualization, InfoOps (IO), International Aid, Journalism/Free-Press/Censorship, Key Players, Memoranda, Methods & Process, Mobile, Open Government, Peace Intelligence, Policies, Policy, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Real Time, Reform, Research resources, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats, Tools, True Cost, Waste (materials, food, etc)
Click on Image to Enlarge

Letter to His Holiness Pope Benedict XVI

Steele Book Profile

Resume Robert David STEELE Vivas M4IS2

See Also:

28 Jan Seven Answers–Robert Steele in Rome

27 Jan Assisi-Rome 2nd Meeting

27 Jan Reference: Correspondence on Assisi Intelligence

16 Jan Event: 26 Oct 2011 Assisi Italy Pope, Peace, & Prayer — 5th Inter-Faith Event Since 1986 — Terms of Reference…

Worth a Look: Book Review Lists (Positive)

Worth a Look: Book Review Lists (Negative)

Richard Wright: MILITARY INTELLIGENCE: All Eyes No Brain Part II

Advanced Cyber/IO, Ethics, Methods & Process, Military, Policy, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy
Richard Wright

The USAF claim that the tragic killing of 23 innocent Afghan civilians last February by one of its Predator UAVs was due to “information overload” reflects an appalling lack of critical thinking on the part of senior Air Force officers. General Mike Hayden (USAF ret.) when director of the NSA used regularly entertain the U.S. congress with the same complaint again reflecting the same lack of critical thought.

The problem for both the USAF and the NSA is that both seem to be following collection and processing strategies that belong to the Cold War era before the information revolution.

The Soviet Union may have been the most incompetent super power in world history, but it was extremely good at information denial. When the NSA could actually find and collect a signal containing exploitable information emanating from the USSR, it was common practice to collect and process everything from that signal 24/7 because it was such a rare occurrence. Because of the Soviet practice of immediately shutting down any signal that there was even as hint had been comprised the material so obtained was compartmentalized and distribution was tightly controlled. All this was possible because the information collected from such a signal at best was miniscule by today’s standards. In the same manner before such neat things as down linking digital images, the number of images to be processed were absurdly small and scarcely time sensitive. So again ‘full take’ was the best, and indeed, the only option.

Continue reading “Richard Wright: MILITARY INTELLIGENCE: All Eyes No Brain Part II”

MILITARY INTELLIGENCE: All Eyes No Brain

04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 10 Security, Advanced Cyber/IO, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Methods & Process, Military, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Real Time, Secrecy & Politics of Secrecy, Strategy, Technologies
DefDog Recommends...

Interesting, but also fails to mention we do not train our analysts on the
basics, know your enemy……we are so focused on technology we forget
that the basics are still the best way to view the situation…..

When military investigators looked into an attack by American helicopters
last February that left 23 Afghan civilians dead, they found that the
operator of a Predator drone had failed to pass along crucial information
about the makeup of a gathering crowd of villagers.

In New Military, Data Overload Can Be Deadly

By THOM SHANKER and MATT RICHTEL

New York Times, Published: January 16, 2011

When military investigators looked into an attack by American helicopters last February that left 23 Afghan civilians dead, they found that the operator of a Predator drone had failed to pass along crucial information about the makeup of a gathering crowd of villagers.

Click on Image to Enlarge

But Air Force and Army officials now say there was also an underlying cause for that mistake: information overload.

See Also:

Gorgon Stare–USAF Goes Nuts (Again)

Gorgon Stare (All Eyes, No Brain)

NIGHTWATCH Extract: US C/JCS & China Arms Race

02 China, 03 Economy, 04 Inter-State Conflict, 07 Other Atrocities, 10 Security, 11 Society, Budgets & Funding, Commerce, Cultural Intelligence, History, Intelligence (government), Military, Peace Intelligence, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Waste (materials, food, etc)

China- US: CJCS Admiral Mullen said today that China's high-tech military capabilities, including the radar-evading stealth J-20 fighter, focus on America.

China has every right to develop military capabilities, Mullen said, adding that he cannot understand why many appear to target the United States despite North Korea's being an evolving threat to the region and to the United States. If Pyongyang obtains long-range nuclear missile capabilities, its provocations may become more catastrophic, Mullen stated, adding that China must pressure North Korean leadership to cease development of intercontinental ballistic missiles and expansion of nuclear weapons capability.

Comment: It is difficult to accept at face value that Admiral Mullen does not understand the Chinese obsession with the threat from the United States.

Taking the statement at face value – and not as an act of political manipulation – it implies that the J2 and J5 staffs have failed to brief him about the origins of Chinese national defense strategy since the death of Deng Xiao Ping. If the Chairman's statement is genuine and not posturing, it is astonishing.

Continue reading “NIGHTWATCH Extract: US C/JCS & China Arms Race”

Journal: CIA Ghosts of Khost Ride Again….

04 Education, 04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society, Corruption, Cultural Intelligence, Government, Intelligence (government), Methods & Process, Misinformation & Propaganda, Officers Call, Secrecy & Politics of Secrecy, Waste (materials, food, etc)
Marcus Aurelius Recommends

Using terminology sometimes used in the DoD special operations community, article below conveys a strong suggestion that in organizing and staffing its operation at Khost, CIA failed to discriminate between enthusiasm and capability.  Based on knowing nothing more about the case than is available to the public, there seems to be a lot to agree with in this article, which seems to get better the farther into it you read.

2.  A quotation long reputed to be associated with Marine Corps Drill Instructors is, “Let's be damned sure that no man's ghost will ever have cause to say, ‘if your training program had only done its job.'”  The obvious supposition is that you actually put people through the training program.  That may not have happened here.

Silent Stars

By Jennifer Sklaka

Washingtonian.com, January 2011

Phi Beta Iota: Click on Silent Stars to read the entire piece, link posted for the record.  Toward the end the article gracefully provides an indictment of CIA's incompetence across multiple fronts.

See Also:

Journal: The Truth on Khost Kathy

Journal: CIA Officer Blew Off Warning in Jordon Weeks in Advance of Jordanian Suicide Bombing in Afghanistan that Killed Seven

Journal: CIA Does It Again….(Taliban Imposter)

Reference: Panetta Puts Lipstick on the Pig (Again)