Robert Steele: Reinventing the US Army Part I – An American Grand Strategy

Steele, Robert. Reinventing the US Army Part I – An American Grand Strategy, Carlisle, PA: Strategic Studies Institute, U.S. Army War College, Press, Projected Publication 2017. Part I in the Reinventing the US Army monograph series. Updated November 15, 2016 Robert Steele This is the author’s preliminary draft of the first of three monographs focused …

Yoda: MIT Hypes Artificial Intelligence — All Ying, No Yang

Good ying, no yang…. Unique computer system developed at MIT aims to get the humans out of data analysis A new system developed by researchers at Massachusetts Institute of Technology (MIT) and Artificial Intelligence Laboratory (CSAIL) can surpass the smartest people in the world. It aims to exclude the human element out of the data …

Robert Steele: Applied Collective Intelligence 2.0

Applied Collective Intelligence 2.0 Can Open Source Evolutionary Cybernetics Leverage Distributed Human Intelligence While Advancing Artificial Intelligence? DOC (16 Pages): 20151018 Applied Collective Intelligence 2.0 DOC (3 Pages): D3 Innovation Memorandum 2.1 (to VP, SecState, SecDef, D/OMB, A/USAID delivered 14 October 2015) SHORT URL: http://tinyurl.com/Steele-ACI2 ABSTRACT The information and intelligence (decision-support) domains have lost their …

Robert Steele: UNHINGED — Two Books on Terror Reviewed (Rebuttal, a Book of Lies & Broken!, Truth as Fiction)

UNHINGED: American Terror, Torture, & Treason SHORT URL: http://tinyurl.com/CIA-UNHINGED Robert David Steele PDF (5 Pages): UNHINGED TORTURE as published with cover matter Rebuttal: The CIA Responds to the Senate Intelligence Committee’s Study of Its Detention and Interrogation Program by Porter Goss et al, Naval Institute Press, 352 pp., £14.99, September, ISBN 978 1 591 14587 …

Berto Jongman: Pentagon Weapons Vulnerable to Open Internet Connections for Performance Monitoring

Pentagon’s Online Habits Render US Weapons Info Highly Vulnerable The Pentagon’s longstanding practice of connecting networks, equipment, and weapons to the open Internet has unintentionally created major vulnerabilities throughout the Defense Department. The strategy was supposed to facilitate the collection of performance data to help design new weapons and monitor equipment remotely, among other benefits. Instead, it has jeopardized …