2013 Robert Steele Reflections on [Search:] non+traditional+threat 1.2

Civil Society, Cultural Intelligence, Earth Intelligence, Peace Intelligence, Searches, Threats
0Shares
Robert David STEELE Vivas
Robert David STEELE Vivas

ROBERT STEELE:  I have elected to answer this personally.  It may well be the most fundamental question this web site has received in that any corruption in the answer to this question assures the failure of any strategy, policy, acquisition, or operation that is spawned from an inherently corrupt — a deliberately corrupt — refusal to take the question seriously.

There are several ways to address this.  The first is the most obvious, which is to say that the traditional threat is state on state conventional forces, and the non-traditional threats are everything else.  Here in one chart is what General Al Gray, USMC, then Commandant of the Marine Corps, with my assistance as his ghost-writer, put in “Global Intelligence Challenges in the 1990's” (American Intelligence Journal, Winter 1989-1990).

Click on Image to Enlarge
Click on Image to Enlarge

The whole point of that article was to suggest that both the US Intelligence Community and the US Department of Defense needed to radically alter how they trained, equipped, and organized.  I now realize that it was corruption, not stupidity, that buried this message.  As SOCOM and Navy Irregular Warfare said in defending their decision not to go after the Somali pirates from 2005-2008 and later, “it's not an expensive enough problem.”

Continue reading “2013 Robert Steele Reflections on [Search:] non+traditional+threat 1.2”

Owl: Is DHS A Police State? Or Just Moving Money?

05 Civil War, 07 Other Atrocities, Corruption, Government, Idiocy, Ineptitude
0Shares
Who?  Who?
Who? Who?

Other Pieces of the US Police State are Moving Into Place on Schedule

“Documents obtained by the Electronic Frontier Foundation from the Homeland Security Department's Customs and Border Protection indicate that the agency is close to finalizing payload standards for its drone aircraft. Among the things the CBP might want to use in its unmanned aircraft: “non-lethal weapons designed to immobilize” targets. In 2009, the agency announced that it had acquired its sixth Predator drone, stationed at an Army Airfield in Arizona.”

As pointed out by a commenter to the article, “For one thing, there are no “non-lethal weapons”. DoD long ago renamed them “less than lethal”, because of the legal liability (rubber bullets can kill, just as a hard hit baseball to the chest can stop the heart) But more significant, DHS is paving the road for internal use of armed drones, against Americans! Or did you for one minute think that these birds are glued to the border, and can only face South?”

More:

Customs and Border Protection Wants to Arm Drones

Continue reading “Owl: Is DHS A Police State? Or Just Moving Money?”

Jean Lievin & Jon Rappoport: Is Ed Snowden A Stake In Heart of USG-Wall Street Market Rigging? Is an Impeachment Shit-Storm Looming? Will Extratradition of US Bankers Be Demanded?

04 Indonesia, 05 Iran, 08 Wild Cards, Commerce, Corruption, Government, Liberation Technology, Military, Policy, Privacy
0Shares
Jean Lievens
Jean Lievens

Max Keiser Explains Significance of Edward Snowden’s “Leak”

Twitching, rumpled and passionate, Max Keiser explains the deeper significance of Edward Snowden’s recent intelligence leaks.  It’s not about national security.  Keiser implies that Snowden has revealed evidence of a fascist market-rigging operation that’s ultimately funding America’s secret government–a corporate plutocracy.

 

Jon Rappoport
Jon Rappoport

Matrix: Who is Edward Snowden?

By Jon Rappoport

This article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…

EXTRACT

For years ATS [substitute NSA] had been using its technological superiority to conduct massive insider trading. Since the early 1980s, the company had spied on anyone and everyone in the financial world. They listened in on phone calls, intercepted faxes, and evolved right along with the technology, hacking internal computer networks and e-mail accounts. They created mountains of ‘black dollars’ for themselves, which they washed through various programs they were running under secret contract, far from the prying eyes of financial regulators.

Those black dollars were invested into hard assets around the world, as well as in the stock market, through sham, offshore corporations. They also funneled the money into reams of promising R&D projects, which eventually would be turned around and sold to the Pentagon or the CIA.

Read full article.

Continue reading “Jean Lievin & Jon Rappoport: Is Ed Snowden A Stake In Heart of USG-Wall Street Market Rigging? Is an Impeachment Shit-Storm Looming? Will Extratradition of US Bankers Be Demanded?”

Berto Jongman: MIT App Replicates NSA Handling of Your Meta-Data — Silver Lining

Advanced Cyber/IO
0Shares
Berto Jongman
Berto Jongman

MIT tool connects the dots of your life through Gmail metadata

How much does the metadata gathered in your inbox reveal about you? Quite a lot, judging by what researchers at the MIT Media Lab have managed to accomplish with Immersion. They've built a web app that — once you grant it permission to do so — digs through your email history to piece together a “people-centric view of your email life.” What does Immersion look at, exactly? Only the senders, recipients (including those CC'd), and timestamps within your email archives. It steers clear of subject lines and the actual bodies of your messages.

Read full article.

Phi Beta Iota:  The silver lining in all this is that it illuminates what a World Brain will look like when every “thing” has its own URL and carries its true cost as well as its usage history with it.  Anything with a toxin in its history will glow red and buycotts will become as easy as pointing your phone at something and respecting the red dot that flashes at whatever level you have chosen.

See Also:

Graphic: True Cost of Sugar to Society