Worth a Look: IntelNews.org

Collaboration Zones, Communities of Practice, Worth A Look
0Shares
Online Site for IntelNews
Online Site for IntelNews

Reaonsable and useful coverage, shows great promise.  Ideal would be a collaborative deal with the Association for Intelligence Officers (AFIO) to have it all in one place.

Sample postings, along with clips “News You May Have Missed” all focused on government secret intelligence and counterintelligence that are NOT covered by Phi Beta Iota.

Iran government spying on ex-pat dissidents, says Germany

Senior Afghan official says Pakistan aided Kabul suicide bombing

MI5 chief defends use of intelligence extracted through torture

Senator says Obama employs Bush tactics on spy secrecy

Journal: Strategic Analysis & Culture Matter

08 Wild Cards, 10 Security, 11 Society, Government, Military, Peace Intelligence
0Shares

Full Story Online
Full Story Online

The Afghanistan Problem

The huge cultural misunderstandings between Western forces and the Afghan people make it unlikely any counterinsurgency mission in the countryside will succeed.

By Gilles Dorronsoro

In the countryside, Westerners are essentially perceived as corrupt and threatening to traditional Afghan or Muslim values. Contrary to our self-perception, the villagers see the foreigners as the main providers of insecurity. The presence of coalition troops means IEDs, ambushes and airstrikes, and consequently a higher probability of being killed, maimed or robbed of a livelihood. Any incident quickly reinforces the divide between locals and outsiders, and the Afghan media provide extensive and graphic coverage of botched airstrikes and injured civilians.
Continue reading “Journal: Strategic Analysis & Culture Matter”

Journal: Haggle, Freenet, TOOZL, and Syllable

Technologies
0Shares
Document Online
Document Online

Clean-slate networking for mobile devices

2007 Abstract: Haggle is a layerless networking architecture for mobile devices.  It is motivated by the infrastructure dependence of applications such as email and web browing, even in situations where infrastructure is not necessary to accomplish the end user goal, e.g. when the destination is reachable by ad hoc neighborhood communication.  In this paper we present details of Haggle's architecture, and of the prototype implementation which allows existing email and web applications to become infrastructure-independent, as we show with an experimental evaluation.  [Emphasis added.]

Below the Fold: Freenet, TOOZL, and Syllable

Continue reading “Journal: Haggle, Freenet, TOOZL, and Syllable”

Journal: Time Warner Cable Exposes 65,000 Customer Routers to Remote Hacks

Technologies
0Shares
Full Story Online
Full Story Online

A vulnerability in a Time Warner cable modem and Wi-Fi router deployed to 65,000 customers would allow a hacker to remotely access the device’s administrative menu over the internet, and potentially change the settings to intercept traffic, according to a blogger who discovered the issue.

Time Warner acknowledged the problem to Threat Level on Tuesday, and says it’s in the process of testing replacement firmware code from the router manufacturer, which it plans to push out to customers soon.

All of this means that a hacker who wanted to target a specific router and change its settings could access a customer’s admin panel from anywhere on the net through a web browser, log in with the master password, and then start tinkering. Among the possibilities, the intruder could alter the router’s DNS settings — for example, to redirect the customer’s browser to malicious websites — or change the Wi-Fi settings to open the user’s home network to the neighbors.

Continue reading “Journal: Time Warner Cable Exposes 65,000 Customer Routers to Remote Hacks”

Journal: Electronic Voting Fraud, Failure, & Foolishness

11 Society, Civil Society, Collective Intelligence, Ethics, Government, Methods & Process
0Shares
Full Story Online
Full Story Online

Sequoia Voting Systems hacks self in foot

by Mokurai

Tue Oct 20, 2009

Sequoia Voting Systems has inadvertently released the SQL (Structured Query Language) code for its voting databases. The existence of such code appears to violate Federal voting law. Read the announcement after the jump, just as received on the Open Voting Consortium mailing list earlier today.

The Linux “strings” command was able to peel it apart.  Nedit was able to digest 800meg text files.  What was revealed was thousands of lines of MS-SQL source code that appears to control or at least influence the logical flow of the election, in violation of a bunch of clauses in the FEC voting system rulebook banning interpreted code, machine modified code and mandating hash checks of voting system code.

I've got it all organized for commentary and download in wiki form at:

Continue reading “Journal: Electronic Voting Fraud, Failure, & Foolishness”

1988-2009 OSINT-M4IS2 TECHINT Chronology

Collaboration Zones, Communities of Practice, Methods & Process, Mobile, Policies, Real Time, Threats
0Shares
Rock ON, Dude
Steele as Wild Card Speaker

Phi Beta Iota: This started as a short list for the various college and university engineering students that have dialed in, but as we got into it, it became more of a “situational awareness” inventory pulling together both technical “solutions” none of which have been integrated yet, and analytic “requirements” none of which have been satisfied yet.

$75 billion a year for secret intelligence, and we still do not have an analytic desktop toolkit, all-source geospatially and historically and cultural astute back office processing, or global reach to all humans, all minds, all the time.  Sucks for us.  Let's see what the Smart Mob can do….

We specifically invite suggestions in the Comments for removing items from this list, or for adding items from within this website or from any other website.  This is now a work zone.  Steele is available to visit any engineering workshop and especially those working on bottom-up clouds like Swarm DPL (transparently scalable distributed programming language).

See also About the Idea, Articles, Briefs, Handbooks, and Historic Contributions. Use the Menu–everything on this stie responds to “OSINT” that is not a good search term.  Rock on!

TOTALLY TECH:

2009 Arnold Google: The Digital Gutenberg

2008 Memoranda: Policy-Budget Outreach Tool

2006  USSOCOM Software List and STRONG ANGEL TOOZL

2006 Morville (UK) Ambient Findability Massive Scale Beyond Your Imagination A Recommedned Approach to Creating the World Brain with Instant Recall

Continue reading “1988-2009 OSINT-M4IS2 TECHINT Chronology”

SOUTHCOM Week in Review Ending 19 Oct 09

Uncategorized
0Shares

Hot Topics

AA: ‘His reputation's been destroyed' 10/16/09

AA: Imperial Globalization and Social Movements in Latin America 10/16/09

AA: Russia, Bolivia to launch gas joint venture 10/17/09

AA: Western Terror Recruits on the Rise 10/19/09

AR: In Pursuing Human Rights, Argentina Displays a Broken Justice System 10/18/09

CO: Colombia VP under new scrutiny for para meetings 10/19/09

CO: Two teenagers killed in Colombian `military error' 10/20/09

CU: Visit to Cuba by Russian chief of staff stirs new Cold War speculation 10/15/09

HT: Under the Influence: A New Horizon for Haiti 10/16/09

NI: Nicaragua court opens way for Daniel Ortega re-election 10/20/09

VE: Venezuela denies having been advised by Colombia of rebel's flight 10/15/09

Continue reading “SOUTHCOM Week in Review Ending 19 Oct 09”