2013 Robert Steele Answers to MA Student in UK — OSINT and Terrorism 2.0

Am quite happy to help you as very few really have a mastery of this emerging pillar of 21st Century intelligence.  I am posting this answer at Phi Beta Iota to help others, and will gladly respond to any further questions you might have, respecting your individual privacy. 01)  In identifying and discussing the mechanisms …

INTELLIGENCE with INTEGRITY Chapter 2: The InfoSphere & Its Enemies

Utilizar el Traductor de Google en la parte superior de la columna central Utilisez Google Translate au haut de la colonne du milieu Google’ın Orta Sütun Top of Çevir kullanın Используйте Google Translate в верхней части среднего столбца Sử dụng Google Translate Đầu Cột Trung उपयोग Google मध्य स्तंभ के शीर्ष पर अनुवाद 在中间一列的顶部,使用谷歌翻译 04 …

Berto Jongman: SSCI Pre-Hearing Q&A — Superb Questions, Cloudy Answers — Robert Steele Answers 6 of 40 Questions Honestly + IC/CIA Health RECAP

SSCI Pre-Hearing Questions for John Brennan 28 Pages, 40 Questions ROBERT STEELE:  CIA was clearly a full participant in the drafting of these answers, many of which are utter nonsense (being effective at clandestine intelligence, all-source analysis, and open source intelligence, to take three fairly pertinent examples).  The questions are the best I have ever …

Intelligence with Integrity Chapter 1: Public Governance & Public Intelligence

Utilizar el Traductor de Google en la parte superior de la columna central Utilisez Google Translate au haut de la colonne du milieu Google’ın Orta Sütun Top of Çevir kullanın Используйте Google Translate в верхней части среднего столбца Sử dụng Google Translate Đầu Cột Trung उपयोग Google मध्य स्तंभ के शीर्ष पर अनुवाद 在中间一列的顶部,使用谷歌翻译 استخدام …

Rob Dover: Intelligence Failures in Syria & Algeria — Is Open Source Everything an Alternative? Steele Comments

Syria, Mali, Algerian gas-works and ‘Open Source Everything’ Read any government security document, any of the national security strategies produced by a now large number of states and you will get a feel for the proliferation in the number of threats they feel they face. The preamble will normally contain a paragraph explaining that after …

Michel Bauwens: Cloud Computing as Virtual Prison

Cloud Computing as Enclosure 15th January 2013 Republished from David Bollier: “As more and more computing moves off our PCs and into “the Cloud,” Internet users are gaining access to a wealth of new software-based services that can exploit vast computing capacity and memory storage. That’s wonderful. But what about our freedom to create and …