Reference: UnityNet — an M4IS2 Option

08 Wild Cards, About the Idea, Analysis, Augmented Reality, C4/JOE/Software, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, DoD, Ethics, Geospatial, Handbook Elements, Historic Contributions, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Journalism/Free-Press/Censorship, Maps, Methods & Process, Open Government, Policies, Policy, Real Time, Research resources, Strategy, Technologies, Threats, Tools, True Cost
Full Document Online

See Also:

Concept of Operations

Operational Requirements Document

Technical Requirements Document

And Also:

Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II

Search: OSINT software

and references therein down multiple levels…

As well as the thinking of Steve Edwards, Arno Reuser, and Mark Tovey; and among the Americans, Carol Dumaine, Jack Davis, and Ran Hock, among others.

Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II

About the Idea, Advanced Cyber/IO, Analysis, Analysis, Geospatial, Geospatial, Hacking, Historic Contributions, ICT-IT, info-graphics/data-visualization, InfoOps (IO), Innovation, Maps, Methods & Process, Peace Intelligence, Research resources, Technologies, Tools
 

Dr. Dr. Dave Warner

Phi Beta Iota:  STRONG ANGEL was the other major innovation besides CATALYST, Analysis 2000, and MCIA JNID.  Below is Round II from STRONG ANGEL, with Round II from M4IS2 soon to be made public, built around SILOBREAKER (actually, Son of SILOBREAKER).  We considered forcing visits to the Synergy Strike Force home page, but decided that the richness of the content there needed to be displayed here. 

I. Introduction

Welcome to the MESS-KIT wiki: Minimum Essential Software Services for Knowledge and Information Transfer

II. Structure

The MESS-KIT system is composed of three basic components — the software package, the virtual environment and the hardware:

a. APPLICATION SOFTWARE PACKAGE: One or more Virtual Machine Instances that package together an operating system with a web server environment and all free-and-open-source/commercial-off-the-shelf software modules. Example: A VMware instance of an Ubuntu Linux installation with a full LAMP web server hosting environment and associated web software.

b. VIRTUAL MACHINE CLIENT SOFTWARE: One Virtual Machine Software Client to package, distribute, and host one or more Application Software Packages and abstract the application software from the host operating system. Examples: VMWare Fusion and Sun VirtualBox.

c. HARDWARE: Hardware on which the Virtual Machine Client Software and Application Software Package will run. The Hardware will include a host operating system. Examples: MacMini running OSX, ASUS eeePC Netbook running eeeBuntu Linux.

Continue reading “Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II”

Search: OSINT software

Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, Ethics, Geospatial, InfoOps (IO), International Aid, Key Players, Methods & Process, Policies, Searches, Strategy, Technologies, Threats, Tools, True Cost

The search term brings up appropriate results, but the fact of the search gives us an opportunity to provide comment.

1)  Nothing now being used by governments, and certainly not iBase or Palantir, both aging technologies that do not scale and have too many fat-finger handicaps, fulfills the originial requirements documents crafted in the late 1980's.

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

2)  The ONLY programs that have gotten anywhere close are COPERNICUS plus plus, and SILOBREAKER.  However, both of these have been slow to recognize the urgency of integrating–fully integrating–capabilities that address each of the eighteen functionalities.  Below is the list of softwares now in use by US Special Operations Command J-23 Open Source Intelligence Branch along with the STRONG ANGEL TOOZL and a couple of other things.

Memorandum: USSOCOM Software List and STRONG ANGEL TOOZL

See also:

Definitions: M4IS2 (Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing & Sense-Making

Search: The Future of OSINT [is M4IS2-Multinational]

Worth a Look: Deep Web Multilingual Federated Search

1988-2009 OSINT-M4IS2 TECHINT Chronology

Worth a Look: Planetary Skin Data Sharing Initiative

Search: meta-tagging humint

Who’s Who in Librarian Intelligence: Arno Reuser

Who’s Who in Public Intelligence: Mats Bjore

Who’s Who in Collective Intelligence: Stephen E. Arnold

Journal: Dr. Dr. Dave Warner Shares…

Event Report CORRECTED LINKS: Responding to Real Time Information, Open Systems and the Obama IT Vision [Google-Microsoft Meld]

Review: The Starfish and the Spider–The Unstoppable Power of Leaderless Organizations

Review: Innovation Happens Elsewhere–Open Source as Business Strategy

Journal: Google, the Cloud, Microsoft, & World Brain

Worth a Look: GeoChat (SMS Plotted on Map)

2006 Yekelo (ZA) Continental Early Warning & Information Sharing: A Military Perspective on Deterring & Resolving Complex Emergencies

1998 Arnold (US) New Trends in Automated Intelligence Gathering Software

The global standard for multinational information-sharing and sense-making is in the process of being designed, funded, and distributed.  If you think you have something relevant to that, generally only open source software will be considered, get in touch with any of the individuals above.

Reference: Intelligence Support to Small Arms Acquisition–A Brilliant Indictment

10 Security, Analysis, DoD, Methods & Process, Military, Reform, Strategy, Threats, Tools
Full Paper Online

Marcus Aurelius:

(1) US consciously changed from standard main battle rifles firing “full military cartridges” (ie., M-14/7.62×51 NATO, M-1 Garand/cal. 30 M-1) to assault rifles (AR-15, M-16, Stoner System) in the 1960s as we attempted to optimize for short-range engagements in the constrained mountainous/jungle environments of Southeast Asia.  At the time, our primary allies were slight of physical stature;

(2) Concurrently, training and engagement doctrine shifted from carefully aimed individual shots to volume of fire (bursts of various numbers of rounds, the “spray and slay” technique) and various “point and shoot” techniques such as “instinctive aiming,” “quick kill,” etc.;

(3) Ammunition followed suit and emphasis in terminal ballistics shifted from accuracy and kinetic energy to volume of fire and bullet yaw/fragmentation; (4) I attach the SAMS paper by MAJ Ehrhart cited in the article.)

Phi Beta Iota: This one paper is a superb indictment of US DoD leadership from the Secretary of Defense, who claims he does not do “maintenance” but is in fact overseeing “business as usual” for Lockheed et all, to the Undersecretaries (Intelligence does not do intelligence support to acquisitions; Acquisitions could care less about inexpensive individual systems; and Policy simply does not have a clue) to the service leaders responsible for training, equipping, and organizing the forces to be sent into battle by the Combatant Commanders.  The Strategic Generalizations developed by the Marine Corps Intelligence Center in 1989 remain valid–and ignored.

Related Media Article:

April 2, 2010

Army Report: GIs Outgunned In Afghanistan

By David Wood

American troops are often outgunned by Afghan insurgents because they lack the precision weapons, deadly rounds, and training needed to kill the enemy in the long-distance firefights common in Afghanistan's rugged terrain, according to an internal Army study.

Politics Daily Full Story Online

Journal: Individual Dignity & Collective Defense

07 Other Atrocities, 08 Wild Cards, 09 Justice, Civil Society, Law Enforcement, Mobile, Tools

Full Story Online

Google execs convicted in Italy for Down syndrome video

MILAN (Reuters) – A Milan court convicted three Google Inc executives on Wednesday for violating the privacy of an Italian boy with Down's syndrome by letting a video of him being bullied be posted on the site in 2006.

Phi Beta Iota: The Italians made a mistake.  Instead of using the video to aggressively convict the bullies of the Down's syndrome boy, they are shooting the messenger.  This is just as ignorant and ill-advised as the police trying to criminalize Twitter  texts and cell phone video of police brutality.  The right of the people to bear witness cannot be undermined by the courts, IOHO.

Journal: Multi-Lingual Social Networking, Arabic First

04 Inter-State Conflict, 08 Wild Cards, Civil Society, InfoOps (IO), Methods & Process, Technologies, Tools
Full Story Online


Site Hopes Automatic Arabic-English Translation Translates into Peace

A new site hopes the seemingly simple idea of eliminating the language barrier, letting you write in English and be read in Arabic — and vice versa — will cultivate citizen diplomacy between the Middle East and the West. It aims to reduce tensions at the grassroots level between two cultures that increasingly co-exist but seem a world apart.

Meedan, which officially launches Monday, lets users post stories and comments in English and have them automatically translated into Arabic, or the opposite. People who don’t share a common language can have an online discussion in near real time. The name, appropriately, means “gathering place” or “town hall” in Arabic.

Think of it as a social network filled with people you don’t know, but want to understand.

Phi Beta Iota: This is righteous, but as Howard Bloom addresses in Global Brain, it will taqke 50 years and it will not achieve the intended result until the children who START with this are adults in power.  In the meantime, the adults in power who are both digitally and ideologically impaired, will continue to favor war to profit the few over peace to provide prosperity to the many.

Journal: Free Twitter Rocks, People Rule in Haiti

Collaboration Zones, Collective Intelligence, Communities of Practice, Ethics, Geospatial, InfoOps (IO), Key Players, Methods & Process, Mobile, Policies, Real Time, Reform, Strategy, Technologies, Threats, Tools
Full Story Online

Twitter Teams with Haiti Telco To Provide Free Text Tweets

WIRED 22 February 2010

Text messages have already raised $32 million for Haiti relief. Now Twitter is partnering with the devastated nation’s dominant telco to provide free text Tweets to Haitians so they can better keep in touch with each other and the outside world.

“Kevin Thau and our mobile team have recently arranged free SMS tweets for Digicel Haiti customers,” Twitter co-founder Biz Stone writes on the company’s blog. “To activate the service, mobile phone users in Haiti can text follow @oxfam to 40404. Accounts are created on the fly and any account can be followed this way.”

The move is much more than a gesture, as it might seem in place where limitless text plans abound and the standard of living is much higher. Under Digicel’s pre-paid plan Haitians pay $0.08 to text locally, $0.15 to text internationally and $0.23 to send an MMS. But considering that the country’s per capita income is about $1,300, that would be the equivalent of $2.46, $4.62 and a whopping $7.07 in the U.S. (which had a 2008 per capita income of about $40,000).

As has become almost routine now, the initial flood of information and pictures to emerge from the disaster zone reached the world via Twitter, and the use of texting is an especially crucial lifeline in the underdeveloped world.

Phi Beta Iota: BRAVO TWITTER!  Who would have thought Haiti would be the silver lining for the poor.  At one stroke Twitter hass connected scharitable giving from the 80% that do not normally give, with the bottom-up needs of the poor articulated via Twitter for free.  Now if Twitter can team with others such as Nokia, Microsoft, and IMB to offer free cell phones to the five billion poor, with back office harvesting of the data and a global grid of volunteer translator educators in 183 languages, we save the world quick time.