Berto Jongman: Humans, Data, & Spies — What Manner, What Value, Integrity?

Data, meet spies: The unfinished state of Web crypto Many large Web companies have failed to adopt a decades-old encryption technology to safeguard confidential user communications. Google is a rare exception, and Facebook is about to follow suit. Declan McCullagh June 26, 2013 Revelations about the National Security Agency’s surveillance abilities have highlighted shortcomings in …

Mini-Me: Smart Young People See Government as Corrupt and Ineffective — World On the Edge of a Sweeping Revolution

Huh? Global protest grows as citizens lose faith in politics and the state The myriad protests from Istanbul to São Paulo have one thing in common – growing dissent among the young, educated and better-off protesting against the very system that once enriched them. And therein lies the danger for governments Peter Beaumont The Observer, …

Search: management, integration, and oversight of intelligence collection and covert action

Here is the original post of the document and our critique. Reference: Intelligence Community Directive (ICD) Number 300: Management, Integration, and Oversight of Intelligence Collection and Covert Action Since then the position of the ADDNI/OS has been abolished, the long-standing director of the OSC that did so much damage in his ignorance and arrogance has …

Allen Roland: Honoring Chalmers Johnson, Prophet of Truth + Empire Meta-RECAP

Prophet for a Dying Empire Every dying Empire has its truth telling prophet and America had its own with Chalmers Johnson. Johnson correctly compared the decay of the American empire, with its well over 600 overseas military bases, with the fall of the Roman Empire whereas the Senate becomes a wealthy corporate club and irrelevant …

Search: phd topics on the role of intelligence in peace support operation + Peacekeeping RECAP

Had to Stop.  WordPress Cannot Handle So Many Links, and Entire Phi Beta Iota Site is About Peace and Prosperity Through Intelligence with Integrity.  Links Below Line Estimated 25% of Relevant Links Across all 12,000+ Posts. Excellent search and badly needed PhD thesis that could “write the book” on the role of intelligence in support …

Berto Jongman: NSA “Tailored Access Operations” (TAO) — Focus on the 2% at Great Expense While Ignoring the 98% Open Access World 2.0 Refs Added

How the U.S. Government Hacks the World Michael Riley BloombergBusinessWeek, 23 May 2013 EXTRACT: The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the …