Berto Jongman: Atrocities, Cyber, War 1.4

ATROCITIES: risks of state-led mass killing AUSTRALIA: Terrorists taking cut of millions in drug money BIG DATA: predictive algorythms and virtues of transparancy CAR: CAR risks spiralling into genocide CHINA: 37,000 Elite Offshore Accounts Outed, China Reacts to Protect Them and Censor the Story CHINA: How Its Leader — Now the World’s Most Powerful Man …

Reflections on Intelligence Reform

SHORT URL: http://tinyurl.com/2014-Reform Security sector reform and advancement begins in the mind.  In the 21st Century, raw information and tailored intelligence (decision support) are fundamental to progress at the strategic, operational, tactical, and technical levels. If we are to properly address intelligence governance from a comparative and international perspective rooted in an appreciation for the …

David Swanson: Obama’s 4th Amendment Speech Deceitful, Even His Fans Are Dismayed

Even Obama Fans Aren’t Pretending That Was a Good Speech President Barack Obama gave a eulogy for the Fourth Amendment on Friday, and not even his fans are proclaiming victory.  In this moment when Obama is actually doing one thing I agree with (talking to Iran), more and more people seem to be slowly, agonizingly …

4th Media: NSA Metadata Collection Fourth Amendment Violation

NSA Metadata Collection: Fourth Amendment Violation Edward Snowden, who worked for the National Security Agency (NSA), revealed a secret order of the Foreign Intelligence Surveillance Court (FISC), that requires Verizon to produce on an “ongoing daily basis… all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and …

Berto Jongman: Bits, Bytes, & Stuff 2.0

BOOK: The Turning Point: Creating Resilience in a Time of Extremes Also: Radio Interview with Author BUDGET: Congress Wants More Insight into Cyber, SOF Budgets CYBER: Cyberwar Increasingly Defined By Espionage and Regional Conflicts, Argues FireEye CYBER: DDoS New Technique, Warns US-CERT CYBER: Google Spyware SMS Tracker CYBER: How Jihadists Use the Internet