Owl: Who Runs the World? New Network Analysis…

03 Economy, 07 Other Atrocities, 09 Justice, 11 Society, Civil Society, Commerce, Commercial Intelligence, Corruption, Earth Intelligence, Government, IO Deeds of War, Military, Money, Banks & Concentrated Wealth, Power Behind-the-Scenes/Special Interests
0Shares
Who? Who?

Who Runs the World ? – Network Analysis Reveals ‘Super Entity’ of Global Corporate

Richard Ricciardi

Planet Save, August 28, 2011

In the first such analysis ever conducted, Swiss economic researchers have conducted a global network analysis of the most powerful transnational corporations (TNCs). Their results have revealed a core of 787 firms with control of 80% of this network, and a “super entity” comprised of 147 corporations that have a controlling interest in 40% of the network’s TNCs.

Read more…

Click on Image to Enlarge

Phi Beta Iota:  It is not the first time this has been done, original work was done in the 1970's on inter-locking boards of directors, and complex forms of relationship analysis were pioneered by Samuel Milgram among others.  It is the first time it has been done in digital form with large amounts of data.  It is not, however, ”
the final answer.”  For that one must understand deep secrecy, over-lapping proxies, the role of clandestine and covert entities, the cross-over among religious organizations, criminal organizations, and government entitites nominally responsible for justice but more often than not actively engaged in crimes against the public interest.  Certainly worth a close read, but the banks are fronts, not the high table.

See Also:

+ Reference: Invisible Empire New World Order DVD + RECAP
+ The Secret Government: The Constitution in Crisis (part 1 of 9)
+ Invisible Government (part 1 of 4, John Pilger)
+ War on Democracy (1 of 10, John Pilger)
+ The American Ruling Class

Howard Rheingold: Delicious into the Future

Advanced Cyber/IO, Blog Wisdom
0Shares
Howard Rheingold

YouTube Founders Revamping a Site for Link Sharing

Jenna Wortham

New York Times, 11 September 2011

SAN MATEO, Calif. — Chad Hurley and Steve Chen have some experience with turning a small Web site into Internet gold. In 2006 they sold their scrappy start-up YouTube to Google for $1.65 billion.

More recently they picked an unlikely candidate to be their next Web sensation: a Yahoo castoff.

The men are trying to inject new life into Delicious, a social bookmarking service that, in its time, was popular among the technorati, but failed to catch on with a broader audience.

. . . . . . .

“Google is still the utility for quickly finding things, like the capital of Texas,” Mr. Chen said. “But when people aren’t doing search for a simple question, we want to capture the results of that idea, that browsing, and showcase the results for the next guy.”

Read rest of article.

See Also:

Delicious Home Page

DuckDuckGo [Phi Beta Iota Alternative to Google]

Search: global brain human brain + RECAP

Paul Fernhout: Global Groundswell Mad as Hell

Civil Society, Cultural Intelligence, Government
0Shares
Paul Fernhout

Global Groundswell: Mad as Hell

Eric Best,

Truthout, 9 September 2011

EXTRACT:

These are just a few examples of grassroots reactions around the world to governments that appear out of touch with or indifferent to the lives of the people – and the people are not standing for it anymore. They are standing up. And in so doing, they are able to leverage the Internet to discover important truths, publicize their efforts, reveal the tyranny or venality of the opposition and draw those of like mind into efforts of resistance and change.

. . . . . .

It also suggests a world in which rapid collaboration can occur around an idea faster than at any time in history. And this will make for volatile politics. This should be contemplated by regimes that have lasted this long without attending to the fundamental needs of people – jobs, education, health, opportunity. Where the governments are failing to “do it all” – and it seems increasingly that all governments are – people are rising up with unprecedented power to do more – if not all – for themselves.

. . . . . .

It is not too much to imagine this will involve the United States, where many are now fed up with its intransigent if not incompetent government.

Read full article.

See Also:

Graphic: Preconditions of Revolution in the USA Today

Paradigms of Failure

Legitimate Grievances (US Internal)

Legitimate Grievances (Anti-US Global)

Reference: Stray Dogs and Virtual Armies – Radicalization and Recruitment to Jihadist Terrorism in the United States Since 9/11

03 Economy, 04 Education, 11 Society, Civil Society, Corruption, Cultural Intelligence
0Shares

Since September 11, 2001, so-called “homegrown terrorists,” working alone or with others, have planned and in some cases implemented terrorist activities, contributed financial or other material support to others' terrorist activities, or become radicalized in the United States and then traveled to other countries to conduct terrorist activities directed against those countries or against the United States. This paper examines the cases of homegrown terrorism from 9/11 through 2010, highlights lessons learned from those cases that suggest actions for the future, and includes a chronology of numbers and case descriptions of terrorist events in the United States during that period. Most of the individuals involved are Muslim, but the numbers are small. A total of 176 Americans have been indicted, arrested, or otherwise identified as jihadist terrorists or supporters since 9/11. They were involved in 82 cases, a majority of which involve the actions of a single individual. Al Qaeda has increasingly used the Internet to build an army of followers. Many of the terrorists identified in this study began their journey online. However, al Qaeda has not yet managed to inspire its online followers to action. Few of the 32 locally hatched jihadist plots to carry out terrorist attacks in the United States since 9/11 got much beyond the discussion stage. Nevertheless, al Qaeda remains a threat. More terrorist attempts will occur. Traditional law enforcement, in which authorities attempt to identify and apprehend a perpetrator after a crime has been committed, is inadequate to deal with terrorists who are determined to cause many deaths and great destruction and who may not care whether they themselves survive. Public safety demands a preventive approach — intervention before an attack occurs. In addition to law enforcement, intelligence collection, and community policing, public reaction is an essential component of such preventive defense.

Source

Tip of the Hat to Berto Jongman for the pointer.

Continue reading “Reference: Stray Dogs and Virtual Armies – Radicalization and Recruitment to Jihadist Terrorism in the United States Since 9/11”

Search: citation indices services

Searches
0Shares

The original citation service in the USA is provided by the Institute of Scientific Information (ISI), which publishes the Science Citation Index (SCI) and the Social Science Citation Index (SSCI).  These are both online at DIALOG, and can be searched using the RANK command to identify the top 10, 20, 100 authors based on a specified topic and how many times others have cited them.  Generally it is useful to also note the number of articles each author has published, and to create a visualization of the citation clusters that quickly identify both centers of excellence and citation “clubs” a form of citation incest.  Acquired by Thomson Reuters, and losing Eugene Garfield and Henry Small (the latter to Maps of Science, see below), this is still the primary service but not growing to its fullest potential.  We exploit this via specialist information brokers; Mary Ellen Bates in particular has pioneered use of the RANK command–someone who does not know what they are doing can run up a huge bill that is not necessary.

Elsevier, late to the game, publishes an online service, Scopus.

China has adapted the idea to its own publications, and this is an extraordinary resource, one that a multinational Open Source Agency would strive to rapidly extend to all nations and all languages.  This is not to be confused with the effort by Thompson Reuters to expand into Chinese citation analytics as described by Philip Purnell in “Citation Analysis in China,” Beijing, May 2011.

Maps of Science, founded by Dick Klavans, who is unique for having complete access to all ISA data for his company, recently confirmed by a court when ISI balked at honoring its original deal, is the best exploitation scientist and artist we know of, using citation to find clusters of excellence and to identify gaps at the national, industrial, or company level.