NIGHTWATCH: Pakistan Military Cancels All Peace Negotiations with Pakistani Taliban — Military Operations Expected Shortly

05 Civil War
0Shares

Pakistan: Pakistani press reported today, “Authoritative sources have told the government clearly there is no space left for holding talks with the militants after the attacks carried out by militants against senior army officials and against religious minorities. “

“This is because instead of giving a positive response to the talks offer, the militants have considered it as their success and as Pakistan's weakness. The prime minister and the federal interior minister have been told to once again contact those politicians, who were present in the All Parties Conference, in order to hold consultations with them on this new situation. The offer of talks should be officially withdrawn and permission should be given for carrying out operation against the terrorists.”

Continue reading “NIGHTWATCH: Pakistan Military Cancels All Peace Negotiations with Pakistani Taliban — Military Operations Expected Shortly”

Berto Jongman: John McAfee Vows to Make Internet “Impossible to Hack” + Internet/Human Intelligence Meta-RECAP [Bottom Line Up Front: Internet without Intelligence and Integrity is Noise]

Advanced Cyber/IO
0Shares
Berto Jongman
Berto Jongman

John McAfee vows to make Internet ‘impossible to hack'

By Dan Nakaso

dnakaso@mercurynews.com

>Posted:   09/24/2013 05:38:37 PM PDT | Updated:   a day ago

SAN JOSE — Anti-virus software pioneer John McAfee, who buried himself in the sand to hide from police in Belize, faked a heart attack in a Guatemalan detention center and admits playing the “crazy card,” says he's now ready for his next adventure: a return to Silicon Valley.

At age 67, McAfee is promising to launch a new cybersecurity company that will make the Internet safer for everyone.

Full story — and Phi Beta Iota comment with links — below the line.

Continue reading “Berto Jongman: John McAfee Vows to Make Internet “Impossible to Hack” + Internet/Human Intelligence Meta-RECAP [Bottom Line Up Front: Internet without Intelligence and Integrity is Noise]”

Berto Jongman: BRICS Creating Own Internet — Routing Around the US-UK

Advanced Cyber/IO
0Shares
Berto Jongman
Berto Jongman

The BRICS “Independent Internet” Cable. In Defiance of the “US-Centric Internet”

The President of Brazil, Dilma Rousseff announces publicly the creation of a world internet system INDEPENDENT from US and Britain ( the “US-centric internet”).

Not many understand that, while the immediate trigger for the decision (coupled with the cancellation of a summit with the US president) was the revelations on NSA spying, the reason why Rousseff can take such a historic step is that the alternative infrastructure: The BRICS cable from Vladivostock, Russia to Shantou, China to Chennai, India to Cape Town, South Africa to Fortaleza, Brazil, is being built and it’s, actually, in its final phase of implementation.

Click on Image to Enlarge
Click on Image to Enlarge

No amount of provocation and attempted “Springs” destabilizations and Color Revolution in the Middle East, Russia or Brazil can stop this process. The huge submerged part of the BRICS plan is not yet known by the broader public.

Nonetheless it is very real and extremely effective. So real that international investors are now jumping with both feet on this unprecedented real economy opportunity. The change… has already happened.

Brazil plans to divorce itself from the U.S.-centric Internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward politically fracturing a global network built with minimal interference by governments.

Continue reading “Berto Jongman: BRICS Creating Own Internet — Routing Around the US-UK”

Berto Jongman: Open Secure Internet Moves Forward — Estonia Leads the Way

Advanced Cyber/IO, Peace Intelligence, Software
0Shares
Berto Jongman
Berto Jongman

How the Tech-Savvy Estonian President Led His Country to the Cutting Edge of Internet Politics

On Monday, September 23, the President of Estonia, Toomas Hendrik Ilves, gave the key note address at the United Nations panel discussion entitled “A Secure and Free Internet.” That day he was also hailed in a thorough profile on Buzzfeed as “The President of Twitter.”

Today Ilves spoke about Internet freedom and cybersecurity at Columbia University, as part of their World Leaders Forum, with the authority and expertise of a university professor, complete with a patterned bow tie. His talk this afternoon was basically an introductory lecture on modern warfare and the philosophy of informational technologies, punctuated by references to the books taught in Columbia College's common core curriculum.

Ilves compared the Internet revolution to “a sped up version of industrialization.” After going on a technological tangent, he half-heartedly apologized, but pointed out that, “we will all have to know a little bit of technology in order to survive in the future.”

How did he become such a vocal influence and thought leader, online and off, in Internet politics and cybersecurity? Ilves himself traces it back to 2007, when Estonia became the first target—or at least the first target to go public with the information—of cyberattacks motivated by politics.

In an op-ed for the New York Times earlier this year, Ilves wrote that the 2007 attacks were in fact a “blessing—Estonia took cybersecurity seriously earlier than most.”

Continue reading “Berto Jongman: Open Secure Internet Moves Forward — Estonia Leads the Way”

Steve Aftergood: Court Finds CIA in Contempt on FOIA Abuse

Corruption, Government
0Shares
Steven Aftergood
Steven Aftergood

COURT CURBS CIA USE OF A FOIA EXEMPTION

The Central Intelligence Agency tried to make “inappropriate” use of an exemption from the Freedom of Information Act to withhold information that was not subject to the exemption, a federal court ruled last month.

In a significant interpretation of the Central Intelligence Agency Act, Judge Beryl A. Howell narrowed the permissible scope of records that CIA may withhold under Section 403g of the Act.  That section allows CIA to exempt from release information concerning “the organization, functions, names, official titles, salaries, or numbers of personnel employed by” the Agency.

But in a 163 page opinion in response to a lawsuit brought by the non-profit National Security Counselors, Judge Howell ruled on August 15 that CIA was interpreting this provision in a manner that was “inappropriately broad” (discussed at pp. 99-122).

Instead of just withholding information about CIA organization and personnel, she concluded, the Agency was also wrongly attempting to withhold “information that relates to” CIA organization and personnel– which is almost everything the Agency does.

“The Court holds that the CIA may not invoke [50 USC] 403g to withhold information merely because that information may be used by CIA personnel to carry out their responsibilities or functions,” Judge Howell wrote. “The CIA Act does not protect all information about CIA functions generally… The CIA may only invoke 50 USC 403g to withhold information under the FOIA if it would reveal the specific categories of personnel-related information enumerated in the statute.”

If that seems like a common-sense conclusion, it is also a rare judicial setback for the CIA, and a reversal of the more familiar expansion of national security secrecy authority.

“This really is something pretty remarkable,” said Harry Hammitt of Access Reports, which monitors FOIA policy. “Judge Howell has narrowed the interpretation of the statute dramatically.”

Berto Jongman: Mercyhurst Sources & Methods (Foreign Language Online Learning)

Knowledge
0Shares
Berto Jongman
Berto Jongman

Top 11 Online Language Learning Resources (Or: How To Make Yourself More Attractive For US Government Intelligence Positions)

In fiscal year 2011, the National Intelligence Program (NIP) made payments to 7,507 government employees within the CIA, DIA, FBI, NGA and NSA for foreign language proficiency (See the Washington Post's breakdown of the so-called “Black Budget”). This is not surprising given the Director of National Intelligence's emphasis on foreign language capability within the US national security intelligence community.

Among the top foreign languages are all the usual suspects – Spanish, Arabic, and Chinese -whereas less common languages populate the “special interest languages” list – Tagalog, Punjabi, Somali and Urdu.

Similarly, the scores on the Department of Defense's DLPTs (Defense Language Proficiency Tests) can earn you pay incentives within government positions and the US Army for each of three language lists – A, B and C – ranked by importance

What does this mean for entry-level intelligence analysts?

It means that being bi- or multi-lingual is practically a pre-requisite for an intelligence analyst position.

Can't afford Rosetta Stone or other expensive programs? No time in a busy class schedule (or even busier work schedule) for a foreign language course?

Don't worry – You don't have to have a BA in Balkan Studies to pass a Serbo-Croatian language exam. There are plenty of (free!) online resources to help you achieve language proficiency levels all on your own.

Below are the top language learning resources on the web according to the blogosphere:

Read rest of post with many links.

Berto Jongman: Jeff Richelson’s Collection of Documents on Underground Facilities – Intelligence and Targeting Issues

04 Inter-State Conflict, 08 Proliferation, 08 Wild Cards, Government, IO Deeds of War, Military, Peace Intelligence
0Shares
Berto Jongman
Berto Jongman

Underground Facilities: Intelligence and Targeting Issues

U.S. Intelligence: Hiding of Military Assets by “Rogue Nations” and Other States a Major Security Challenge for 21st Century

U.S. Documents Describe Monitoring Effort Going Back to Early Cold War Years

National Security Archive Electronic Briefing Book No. 439

UPDATE – September 23, 2013

Originally Posted – March 23, 2012

For more information contact:
Jeffrey T. Richelson – 202/994-7000
nsarchiv@gwu.edu

natanzWashington, D.C., September 23, 2013 – While the focus on Syria's chemical weapons use, and the possibility of military action against Syrian government targets pushed aside, for a while, the issue of how to deal with Iran's nuclear program,1 the two situations have one thing in common — their reported reliance on underground facilities to shield the production and storage of weapons of mass destruction.

Documents posted today by the National Security Archive show that such sites in Syria are only the latest in a long line of alleged and real underground facilities that have posed a high priority challenge for U.S. and allied intelligence collection and analysis efforts, as well as for military planners. There may be more than 10,000 such facilities worldwide, many of them in hostile territory, and many presumably intended to hide or protect lethal military equipment and activities, including weapons of mass destruction, that could threaten U.S. or allied interests.

Today's posting features 21 new documents, in addition to the 41 records from the Archive's initial March 23, 2012, posting on this subject. The new materials include several concerning a key topic of Cold War intelligence collection and analysis — hardened and underground communications facilities. Also included for the first time are draft charters for the National Reconnaissance Office (NRO) working group on hardened and buried targets. The majority of the new materials consist of reports from the Asian Studies Detachment (ASD) of the 500th Military Group of the Army Intelligence and Security Command. The ASD reports, based on open source intelligence, focus on various aspects of hardened and buried facilities in North Korea and China.

The 21 new items, with one exception, were acquired via Freedom of Information Act requests or research in the National Archives. The original posting described in detail the agencies and programs the U.S. government has brought to the task of identifying and assessing underground structures in foreign countries since World War II.

Read New Introduction and See Complete List of Documents with Links