1976-2015: Analytic, Methodological, & Technical Models 2.2

SHORT URL: http://tinyurl.com/2014-Intel-Models Updated 5 September 2015 1976 PREDICTING REVOLUTION Conditions existing in USA today are in red. 1976 Thesis: Theory, Risk Assessment, and Internal War: A Framework for the Observation of Revolutionary Potential 2011 Thinking About Revolution in the USA and Elsewhere (Full Text Online for Google Translate) Graphic: Pre-Conditions of Revolution Graphic: Preconditions …

David Isenberg: GWOT Has Shredded CIA’s Focus and Utility – Plus Renaissance References

Intelligence WOT distorting focus, resource allocation of U.S. intelligence community: experts The U.S. Intelligence Advisory Board, a panel of fourteen highly regarded and experienced experts, many of whom past holder of high-level national security positions, has submitted a secret report to President Obama in which they say that the intense, 12-year focus of the intelligence …

Search (3): Analytic Models, 10 Threats, Threat Support to Acquisition

Ada Bozeman, in Strategic Intelligence and Statecraft: Selected Essays, has written: (There is a need) to recognize that just as the essence of knowledge is not as split up into academic disciplines as it is in our academic universe, so can intelligence not be set apart from statecraft and society, or subdivided into elements…such as …

Open Power: Democracy Lost & Found Essay, Book Review Blurbs and Links [Updated 3 MAR 2015]

NEW: Kindle Book Open Power ($2.99) OLD: Core Documents for Both Initiatives (Free) OLD: the foundation book The Open Source Everything Manifesto ROBERT STEELE: There are two schools of thought on effecting political (and hence economic and social) reform. One school is the school of love — this school emphasizes trust building and doing no …

Marcus Aurelius: Badley Manning Merits Execution — What He Did Has Brought DoD Information Handling to Its Knees

(1) Tragic that this is being tried as non-capital case; IMHO, Manning deserves to be executed; (2) for those readers not currently in government and thus not dealing with government computer systems on daily basis, it’s impossible to adequately convey how much Manning’s treachery has cost us in terms of lost functionality, lost access to …

Reference: Top-Notch Report on Chinese Exploitation of US Idiocy & Incompetence

2013 Mandiant_PRC Cyber APT1_Report Phi Beta Iota:  The naive and the unscrupulous emphasis external threats and internal vulnerabilities while glossing over the FACT that this threat was clearly articulated by Winn Schwartau, among others, in 1990, and clearly articulated, in a letter delivered in 1994 to Marty Harris at the National Information Infratructure (NII) reporting …

DefDog: Air Force Creates Valor Medal for Video Kills UPDATED 18 Feb 2013

UPDATED 18 Feb 2013 to add Reactions This is absolutely insane….ranks higher than a Bronze Star for Valor and cannot be awarded for serving in a combat zone. The Air Force pushed it in an effort to control the Drone and Cyber environment….Air Force would not let any comments from Afghanistan….payoff for the homage of …