Open Source Intelligence (OSINT) Inspect & Train

#Events, Advanced Cyber/IO, Collective Intelligence, Ethics, Handbook Elements, InfoOps (IO), Officers Call, Peace Intelligence, Sources, Standards, Strategy, Teaching, Threats
Robert David Steele
Robert David Steele

Nobody, anywhere, is doing Open Source Intelligence (OSINT) “right.” There are some nodes where exceptional achievements are the norm in isolation, but by and large, what various governments and corporations are doing and calling “OSINT” is nothing more than very wasteful largely useless Open Source Information (OSIF).  At the same time, no consumer is doing Collection Requirements and Evaluation (CRE) and no consumer is holding the secret intelligence world — in any country — accountable for being very expensive and often useless — 4% “at best” of what the Commanding General at US Central Command needed while fighting two wars and 12 Joint Task Forces.

It’s time we evolve the craft of intelligence, as I have been advocating for 25 years. I wrote the original OSINT Handbooks for DIA, NATO, and SOF, and am writing a new comprehensive OSINT Handbook for release at my new conference at the McLean Hilton 4-6 December 2017.

Some may have noticed that there is a major programmatic re-evaluation of all OSINT contracts underway. My initial impression is that many option years are at risk, particularly those where management is simply not paying attention and does not understand how unhappy the COTRs are. For a simple flat fee paid in advance I will come in and evaluate any OSINT node in one day, and provide a diagnostic of what’s missing and what needs to be fixed to radically reduce risk of the option year not being taken.

Individuals hired as linguists who have no college education and limited experience with digital tools are particularly at risk. The government no longer has the luxury of throwing money around and accepting people because of their language but incapable of understanding a product requirement, designing a research plan, carrying out the research in accordance with the US Army (and other) Open Source Intelligence Handbook precepts, and presenting a finished OSINT product that can be moved into the cloud for sharing with multinational and inter-agency partners.

The US Army, the Special Operations Command, and other elements of the US Government are at the beginning of a complete OSINT program review and program build. In my view, roughly two-thirds of what is being done under CIA precepts that handicap everybody (at the same time that CIA fails to perform effectively in OSINT) should be eliminated, with the savings applied to a completely independent OSINT program funded and owned by DoD but managed in the context of the D3* Innovation Initiative favored by the Secretary of Defense.

As a non-profit educator who is not in competition with any vendor, I am also offering tailored OSINT training that can integrate multiple experts — I have funded over 800 of them over time — in a manner no one else can replicate. Training can be as short as one day and as long as two weeks inclusive of practical exercises on all fronts. Training can be followed with a term of OSINT Help Desk support. This is a contract saver. It can also be used to prep new hires at a cost roughly one tenth the costs of longer programs that teach a great deal that will not be useful and will be quickly forgotten. Think in terms of a $2,500 prep cost versus $10K and up.

The certificate generally reads:

Has completed N hours of virtual online training and N hours of classroom training for a total of NN hours training in Open Source Intelligence (OSINT) support to All-Source Analytics (inclusive of foreign language social media and subject matter expert exploitation utilizing Operations Security (OPSEC) best practices).

The specific methods, tools, official websites, and core references comprising the OSINT Binder are listed. Generally it is the process of OSINT production — including OPSEC — that the individuals have not mastered, the tools are less important — when the client is serious about specific tools they will issue userids and give the contractor analysts a deadline for completing the excellent online training programs that have been paid for as part of the tool purchase agreement.

The other big change in the OSINT world is that most foreign military and law enforcement agencies are finally ramping up their investments in OSINT — EUROPOL just called for all European countries to increase their investments, foreign special operations forces are jumping into this in a big way (and not trusting CIA at all — CIA has lost all credibility in the OSINT arena — its prohibition of overt human contacts by established OSINT cells is criminally insane and mocked by those who see the idiocy of this prohibition). Discussion of a multinational inter-agency intelligence network that is not funded or controlled by the USA has begun. The Chinese, Iranians, and Russian as well as the Turks appear to be seeing that OSINT is the next frontier in Information Operations — not disinformation, but the truth placed before the public, with lies by governments immediately exposed using multi-sourced OSINT. The short-comings of online search are being understood — 80% or more of what we need to know is not secret, not online, not in English, and not accessible without a human path.

I will say for the record that if CIA ever wanted my help, I would gladly assist them.  My mistake these past 25 years has been in assuming that CIA might actually be interested in getting it right, I was naive. My focus now is on teaching anyone who wishes to achieve intelligence with integrity by leveraging both Passive OSINT and Active OSINT as well as Black OSINT and Multinational (MNO) OSINT. I see the military as the hub for creating Smart Nations, and foreign militaries working with their own other “tribes” and especially law enforcement, as the center of gravity for the next 25 years.

Contact Robert Steele

Starting Points for Reflection

2017 Robert Steele: OSINT Done Right

Open Source Everything for the 21st Century – Handbook

Robert Steele: Open Source (Technologies) Agency

Yoda: Big Data Tough Love, Everyone Fails

Advanced Cyber/IO, Analysis, Collaboration Zones, Communities of Practice, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), IO Impotency, Key Players, Officers Call, Policies, Serious Games, Standards, Strategy, Threats
Got Crowd? BE the Force!

The Three Things You Need to Know About Big Data, Right Now

Patrick Tucker

World Future Society  March 11, 2012

Institute for Ethics & Emerging Technologies

Okay. You got me. I can’t really tell you everything you need to know about big data. The one thing I discovered last week – as I joined more than 2,500 data junkies from around the world for the O’Reilly Strata conference in rainy Santa Clara California—is that nobody can, not Google, not Intel, not even IBM. All I can guarantee you is that you’ll be hearing a lot more about it.

What is big data? Roughly defined, it refers to massive data sets that can be used to predict or model future events. That can include everything from the online purchase history of millions of Americans (to predict what they’re about to buy) to where people in San Francisco are most likely to jog (according to GPS) to Facebook posts and Twitter trends and 100 year storm records.

Phi Beta Iota:   Big data is most important for what it can tell you about true cost and whole system cause and effect, inclusive of political corruption and organizational fraud.  These are past and present issues, not future issues.  We design the future based on the integrity present today.  This is why “open everything” matters.

With that in mind, here’s the three most important things you need to know about big data right now:

Continue reading “Yoda: Big Data Tough Love, Everyone Fails”

Yoda: Child-Driven Education, Convergence of Knowledge

04 Education, 11 Society, Advanced Cyber/IO, Blog Wisdom, Collaboration Zones, Communities of Practice, Ethics, Hacking, Methods & Process, Serious Games, Standards, Technologies, Threats, Tools
Got Crowd? BE the Force!

How Children’s Toys Reflect What’s Next in Technology & Education, March 5, 2012, PRAGMATIC VISIONS | by Jim Brazell 

[Editor’s note: This is the first in a new column series from the pragmatic visionaries at the Thornburg Center for Professional Development for edtech digest]

“The availability of technologies to youth is its own instructor.” –Nobelist Herbert A. Simon (June 15, 1916 – February 9, 2001), Author of Science of the Artificial and a Father of Artificial Intelligence

EXTRACT:  TOYS MIRROR WHAT’S NEXT IN TECHNOLOGY

In the same way that Erector Sets were patterned after the technologies of the third phase of the industrial revolution, the LEGO MindStorms kits reflect the structure of emerging technology and careers in the 21st Century. In 2006, Nano Quest from FIRST Robotics enabled students to program LEGO robots to mimic biological, chemical, and physical systems across  micro-, meso-, and nano-scales.

Continue reading “Yoda: Child-Driven Education, Convergence of Knowledge”

Robert Steele: Ignored 1994, Ignored 2011–Deja Vu

07 Other Atrocities, Advanced Cyber/IO, Civil Society, Commerce, Commercial Intelligence, Corruption, Cultural Intelligence, DHS, Director of National Intelligence et al (IC), DoD, Government, Hill Letters & Testimony, IO Impotency, Legislation, Military, Policies, Standards, Technologies
Robert David STEELE Vivas

One of our contributors passed this to me and asked me to comment in relation to the alarm that Winn Schwartau, Bill Caeli, Jim Anderson, and I sounded in 1994, in writing, to Marty Harris, then head of the National Information Infrastructure (NII).

First, the item.

From the man who discovered Stuxnet, dire warnings one year later

Mark Clayton

Christian Science Monitor, 22 September 2011

Stuxnet, the cyberweapon that attacked and damaged an Iranian nuclear facility, has opened a Pandora’s box of cyberwar, says the man who uncovered it. A Q&A about the potential threats.

EXTRACT:

CSM: How would you characterize the year since Stuxnet – the response by nations, industry and government?

LANGNER: Last year, after Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems…. That wakeup call lasted only about a week. Thereafter, everybody fell back into coma. The most bizarre thing is that even the Department of Homeland Security (DHS) and Siemens [maker of the industrial control system targeted by Stuxnet] talked about Stuxnet being a wakeup call, but never got into the specifics of what needed to be done.

Continue reading “Robert Steele: Ignored 1994, Ignored 2011–Deja Vu”

Seth Godin: Back to (the wrong) school — inspires a plan to retrain 44% of the US workforce in one year

03 Economy, 04 Education, 11 Society, Advanced Cyber/IO, Collaboration Zones, Collective Intelligence, Communities of Practice, Ethics, InfoOps (IO), IO Deeds of Peace, Methods & Process, Open Government, Policy, Politics of Science & Science of Politics, Serious Games, Standards, Strategy, Technologies, Threats
Seth Godin

Back to (the wrong) school

A hundred and fifty years ago, adults were incensed about child labor. Low-wage kids were taking jobs away from hard-working adults.

Sure, there was some moral outrage at seven-year olds losing fingers and being abused at work, but the economic rationale was paramount. Factory owners insisted that losing child workers would be catastrophic to their industries and fought hard to keep the kids at work–they said they couldn’t afford to hire adults. It wasn’t until 1918 that nationwide compulsory education was in place.

Part of the rationale to sell this major transformation to industrialists was that educated kids would actually become more compliant and productive workers. Our current system of teaching kids to sit in straight rows and obey instructions isn’t a coincidence–it was an investment in our economic future. The plan: trade short-term child labor wages for longer-term productivity by giving kids a head start in doing what they’re told.

Large-scale education was never about teaching kids or creating scholars. It was invented to churn out adults who worked well within the system.

Of course, it worked. Several generations of productive, fully employed workers followed. But now?

Continue reading “Seth Godin: Back to (the wrong) school — inspires a plan to retrain 44% of the US workforce in one year”

Reference: Smart Nation Act (Simplified) 2011

Advanced Cyber/IO, Analysis, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Congressional Research Service, Ethics, General Accountability Office, Hill Letters & Testimony, InfoOps (IO), Intelligence (government), Key Players, Legislation, Memoranda, Methods & Process, Mobile, Office of Management and Budget, Officers Call, Open Government, Policies, Policy, Politics of Science & Science of Politics, Real Time, Reform, Research resources, Resilience, Serious Games, Standards, Strategy, Technologies, Threats
Click on Image to Enlarge

Original Online (.doc 1 page)

Marcus Aurelius: 22 SEAL Team Six & Others Die in Old Slow Chopper, Because US DoD Never Cared About Training, Equipping, & Organizing for High-Altitude Mountain Warfare

04 Inter-State Conflict, 07 Other Atrocities, 08 Wild Cards, 10 Security, Budgets & Funding, Corruption, IO Deeds of War, Military, Offbeat Fun, Peace Intelligence, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Standards, Strategy
Marcus Aurelius

British press report, unusually thorough, but miss the core point: why so many sent into combat in a single very old, very slow transport helicopter.

Special forces helicopter shot down in Afghanistan was on a mission to rescue U.S. Army Rangers

Daily Mail, 7 August 2011

  • Chopper brought down in rocket attack was on its way to aid other elite troops fighting militants
  • Names of American victims begin to be released
  • Twenty-two of the dead soldiers were from elite Seal Team Six
  • At 30 deaths in total, it’s highest number of U.S. casualties in one incident
  • Seven Afghan soldiers die in the crash
  • President Obama mourns this ‘extraordinary sacrifice’
  • Afghan president sends condolences to Obama

Read more–includes video and map.

Phi Beta Iota:  DoD has not had a global engagement strategy nor a mature joint/multinational acquisition strategy that we know of….the Services have refused to work together and fought for budget share rather than for capabilities relevant to reality and to the safety of the individuals actually going into combat (4% of the force that gets 80% of the casualties and 1% of the budget).  In a word, DoD lacks integrity at the policy and acquisition levels such that no degree of operational excellence can overcome.  The top speed of the Chinook is 185 mph but that is when it is empty, flying below 6,000 feet, and on a delightfully warm not humid day.  These people were sent to their death because DoD does not have the integrity to plan for combat helicopters capable above 6,000 feet.  Sending them into combat like that is the equivalent of sending a SWAT team into a gang fight aboard a train of golf carts.  SHAME!

See Also:

Continue reading “Marcus Aurelius: 22 SEAL Team Six & Others Die in Old Slow Chopper, Because US DoD Never Cared About Training, Equipping, & Organizing for High-Altitude Mountain Warfare”

Tom Atlee: Making Wise Decisions on Public Issues

About the Idea, Advanced Cyber/IO, Blog Wisdom, Civil Society, Collective Intelligence, Collective Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Ethics, Government, InfoOps (IO), Methods & Process, Officers Call, Open Government, Policies, Policy, Reform, Standards, Strategy, Threats
Tom Atlee

Dear friends,

I have worked for several months to develop the ideas in this article and to articulate them in an accessible way.  They are fundamental understandings underlying the co-intelligence vision of a wiser democracy.

If the ideas intrigue you, you can find a longer version with more detailed guidelines and references online.  I wrote the abstract below to make it easier for you to see the whole pattern at once.  I hope you find both versions interesting and useful.

Coheartedly,
Tom

============

GUIDELINES FOR MAKING WISER DECISIONS ON PUBLIC ISSUES

by Tom Atlee

As a civilization we have tremendous collective power, but we don’t always use it wisely.  We can make good decisions, but we face messy, entangled, rapidly growing problems with complex, debatable causes.  Efforts to solve one problem often generate new ones.  We need more than problem-solving smarts here.  We need wisdom.

A good definition for wisdom here is

the capacity to take into account
what needs to be taken into account
to produce long term, inclusive benefits.

To the extent we fail to take something important into account, it will come back to haunt us.  But often we only realize we overlooked something long after our decision has been implemented.  Certain practices – because they lead us to include more of what’s important – can help us meet this challenge.  Here are eight complementary ways to do this.  The more of them we do, and the better we do them, the wiser our collective decisions will be.
Continue reading “Tom Atlee: Making Wise Decisions on Public Issues”

TDL-4 Rules–Industrial Era Governments Helpless

07 Other Atrocities, Collaboration Zones, Communities of Practice, Computer/online security, Corruption, IO Impotency, Key Players, Policies, Real Time, Standards, Technologies
Click on Image to Enlarge

New Botnet, Now 4.5 Million Machines Strong, is ‘Practically Indestructible’

Today in cyber threats: more than four million Windows PCs have been commandeered by a botnet that cybersecurity experts are calling nearly “indestructible.” Known as TDL-4 (it’s the fourth iteration of the malicious program), this particular little nuisance hides in places security software rarely checks and speaks with other infected machines and their overseers in a novel encrypted code. Some are calling it the most sophisticated threat out there today. Watch your back, Stuxnet.

Read rest of story….

Phi Beta Iota: Apart from the known fact that the US Government ignored documented warning from Winn Schwartau, Jim Anderson, Bill Caelli, and Robert Steele in 1994, what we have here is the culimination of fifteen years in which governments continue to operate as Industrial Era hierarchies, choosing secrecy to protect incompetence rather than multinational sharing to achieve resilience–they are as a result inept beyond belief.  The cloud–given the plethora of proprietary and therefore generally insecure hardware and software–is not going to be cleaned up on the present course, where spam is 75% of all email despite the best (isolated) efforts of all concerned.  M4IS2, anyone?

See Also:

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Search: Steele USMC C4I 1990′s

Marcin Jakubowski: Open-sourced blueprints for civilization

About the Idea, Augmented Reality, Collaboration Zones, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), IO Deeds of War, IO Technologies, Methods & Process, Policies, Reform, Standards, Technologies, Tools

Open Source Ecology — 50 Open Source Tools for Resilience

Industrial productivity can be achieved on a small scale….it just requires open source design.  A single DVD is a civilization starter kit.

Interactive Transcript

About The Speaker

About This Talk

Using wikis and digital fabrication tools, TED Fellow Marcin Jakubowski is open-sourcing the blueprints for 50 farm machines, allowing anyone to build their own tractor or harvester from scratch. And that’s only the first step in a project to write an instruction set for an entire self-sustaining village (starting cost: $10,000).