Winslow Wheeler: Defense Cuts, Defense Flim-Flam

07 Other Atrocities, 10 Security, 11 Society, Blog Wisdom, Budgets & Funding, Civil Society, Corruption, Cultural Intelligence, DoD, Government, IO Impotency, Military, Misinformation & Propaganda, Officers Call, Open Government, Peace Intelligence, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Technologies
Winslow Wheeler

There are numerous misleading and misinformed assertions being made about the defense spending parts of the debt deal.

The White House's “fact sheet” asserts a $350 billion savings in the “base defense budget.” The $350 billion in defense savings that the White House declares apparently uses a different “baseline” (basis of comparison) and pretends that a two year cap the bill establishes on “security” spending will extend to ten years.  Most misleading of all, it assumes that all savings in the “security” category (which includes DOD, DOE/nuclear weapons, all State Department related spending, Veterans Affairs, and Homeland Security) will occur only in DOD spending.  In fact, the “security” category was designed to broaden the base for “defense” cuts and to lessen the impact on DOD.  The undocumented $350 billion in “security” savings will actually translate into lesser reductions in DOD spending, but the amount is unknown.  The actual amount will be decided by Congress in the future.

2014 Peace from Above: Envisioning the Future of UN Air Power

Advanced Cyber/IO, Analysis, Articles & Chapters, Augmented Reality, Autonomous Internet, Briefings & Lectures, Budgets & Funding, Collective Intelligence, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Ethics, Geospatial, History, info-graphics/data-visualization, InfoOps (IO), International Aid, Journalism/Free-Press/Censorship, Key Players, Maps, Methods & Process, microfinancing, Mobile, Non-Governmental, Peace Intelligence, Policies, Policy, Real Time, Reform, Serious Games, Strategy, Technologies, Threats, Tools
Click on Image to Enlarge

Short URL: http://tinyurl.com/UNODIN

Steele in Dorn Peace from Above As Published

Finally published in 2014 (Article) originally presented in 2011 (Briefing).

The chapter more fully integrates the DNI spiral between modern mature intelligence (M4IS2) and modern mature Air Power.

Abstract 3.1

Briefing 3.3 (29 Slides With Notes As Presented 40 KB pptx)

Event: 15-17 June Ontario UN Aerospace Power

See Also:

2012 Robert Steele: Practical Reflections on UN Intelligence + UN RECAP

UN Intelligence @ Phi Beta Iota

Worth a Look: Wings for Peace – First Book on Air Power in UN Operations

TDL-4 Rules–Industrial Era Governments Helpless

07 Other Atrocities, Collaboration Zones, Communities of Practice, Computer/online security, Corruption, IO Impotency, Key Players, Policies, Real Time, Standards, Technologies
Click on Image to Enlarge

New Botnet, Now 4.5 Million Machines Strong, is ‘Practically Indestructible'

Today in cyber threats: more than four million Windows PCs have been commandeered by a botnet that cybersecurity experts are calling nearly “indestructible.” Known as TDL-4 (it’s the fourth iteration of the malicious program), this particular little nuisance hides in places security software rarely checks and speaks with other infected machines and their overseers in a novel encrypted code. Some are calling it the most sophisticated threat out there today. Watch your back, Stuxnet.

Read rest of story….

Phi Beta Iota: Apart from the known fact that the US Government ignored documented warning from Winn Schwartau, Jim Anderson, Bill Caelli, and Robert Steele in 1994, what we have here is the culimination of fifteen years in which governments continue to operate as Industrial Era hierarchies, choosing secrecy to protect incompetence rather than multinational sharing to achieve resilience–they are as a result inept beyond belief.  The cloud–given the plethora of proprietary and therefore generally insecure hardware and software–is not going to be cleaned up on the present course, where spam is 75% of all email despite the best (isolated) efforts of all concerned.  M4IS2, anyone?

See Also:

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Search: Steele USMC C4I 1990′s

Marcin Jakubowski: Open-sourced blueprints for civilization

About the Idea, Augmented Reality, Collaboration Zones, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), IO Deeds of War, IO Technologies, Methods & Process, Policies, Reform, Standards, Technologies, Tools

Open Source Ecology — 50 Open Source Tools for Resilience

Industrial productivity can be achieved on a small scale….it just requires open source design.  A single DVD is a civilization starter kit.

Interactive Transcript

About The Speaker

About This Talk

Using wikis and digital fabrication tools, TED Fellow Marcin Jakubowski is open-sourcing the blueprints for 50 farm machines, allowing anyone to build their own tractor or harvester from scratch. And that's only the first step in a project to write an instruction set for an entire self-sustaining village (starting cost: $10,000).

DOT&E Documents and Tony Capaccio Story

03 Economy, 07 Other Atrocities, 10 Security, Budgets & Funding, Commerce, Commercial Intelligence, Corporations, Corruption, Cultural Intelligence, Ethics, Government, Military, Policy, Politics of Science & Science of Politics, Standards, Technologies
Winslow Wheeler

There are a set of documents at the DOT&E website which offer DOT&E insights into the reason for why about 40 programs have experienced delays — and costs.  These documents relate to a Tony Capaccio story in today's Bloomberg News (below).

The document titled “Updated DOT&E Input on Program Delays” (at the DOT&E link shown above) identifies various specific reasons for the problems programs experience — different from most of the explanations from contractors and other system advocates in and out of the Pentagon.  (Eg. for the F-35:  Fly rates per month lowered to more realistic projections (from 12 max for all variants and venues to 10 max for CTOL/CV flight sciences, 9 max for STOVL flight sciences, 8 max for all mission systems); increased planning factors for re-fly and regression (up 15% for flight science, 10% for mission systems); more time required for software development and incremental builds.”)

Beyond the F-35, the various systems described in the analysis are typically more obscure programs (eg. AIM-9X 8.212 Software Upgrade) but there are also a few better known ones, such as LCS, which is described in “fly before buy,” Congress and the Navy want to rush ahead of testing to buy 4 LCS in the 2012 HASC DOD Authorization bill for $1.8 billion in production costs.

Availability of complete mission packages will be delayed until at least 2015.

Instead of withholding production of untested systems with clear and obvious development problems, Congress and the Pentagon are intent on business as usual.  The LCS is a good example: instead of “fly before buy,” Congress and the Navy want to rush ahead of testing to buy 4 LCS in the 2012 HASC DOD Authorization bill for $1.8 billion in production costs.

Some will think the DOT&E analysis and documents to be obscure and too “in the weeds” to pay much attention to.  Instead, they offer a major part of the explanation for why hardware costs and delays are so out of control, and they offer a stunning view into how little is being done about that.

BloombergNews.com, June 13, 2011

Weapons Testers Found Not to Blame for Procurement Delay

Worth a Look (DVD): One Man, One Cow, One Planet

Advanced Cyber/IO, Atlases & State of the World, Change & Innovation, Collective Intelligence, Collective Intelligence, Communities of Practice, Complexity & Resilience, Counter-Oppression/Counter-Dictatorship Practices, Crime (Corporate), Cultural Intelligence, Culture, Research, Disease & Health, Earth Intelligence, Economics, Environment (Solutions), Ethics, Gift Intelligence, InfoOps (IO), Intelligence (Public), Key Players, Methods & Process, Nature, Diet, Memetics, Design, Peace Intelligence, Peace, Poverty, & Middle Class, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Public Administration, Reform, Reviews (DVD Only), Science & Politics of Science, Stabilization & Reconstruction, Strategy, Survival & Sustainment, Technologies, Technology (Bio-Mimicry, Clean), Threats, Truth & Reconciliation, Values, Ethics, Sustainable Evolution
Amazon Page

Home Page of DVD

Phi Beta Iota: The industrialization/ chemicalization of agriculture, in combination with the corruption of every aspect of society beginning with governance and extending to the media, has allowed for the desecration of the Earth and the poisoning of humanity.  This has been done with the explicit consent and encouragement of the so-called elites of the West, who have a vision of eugenics and the covert eradication of the poor and uneducated over time.  These elites do not see that the brainpower of the three billion poor is the only thing that can restore natural harmony and sustainable agriculture as well as legitimate governance and natural capitalism.  The time has come to create M4IS2–public intelligence in the public interest.

In “borderless” cyberspace, nation states struggle — M4IS2 Anyone?

Advanced Cyber/IO, Analysis, Augmented Reality, Budgets & Funding, Collective Intelligence, Communities of Practice, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Earth Intelligence, Ethics, Geospatial, History, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Journalism/Free-Press/Censorship, Key Players, Methods & Process, Officers Call, Peace Intelligence, Policies, Policy, Politics of Science & Science of Politics, Real Time, Reform, Research resources, Serious Games, Standards, Strategy, Technologies, Threats, Tools, Whole Earth Review
Click on Image to Enlarge

Analysis: In “borderless” cyberspace, nation states struggle

By Peter Apps, Political Risk Correspondent

Reuters LONDON | Thu Jun 9, 2011

EXTRACT:

“The nature of cyberspace is borderless and anonymous,” R. Chandrasekhara, secretary of India's telecommunications department, told a cyber security conference in London last week organised by a U.S.-based think tank, the EastWest Institute. “Governments, countries and law — all are linked to territory. There is a fundamental contradiction.”

Read full article….

Tip of the Hat to Chris Pallaris at LinkedIn.

Phi Beta Iota: The national secret intelligence communities mean well, but they are cognitively and culturally incapacitated  in relation to both the global threats and the global infomation sharing and sense-making possibilities.  It may just be that the solution has to come from a private sector service of common concern that can provide the integrity now lacking in governments and most corporation.  Scary thought.  M4IS2 is inevitable….delay is costing trillions.