Robert Garigue: Three Information Security Domains–the Physical (Old), the Process (Current), and the Content (Future)

Core Point:  The US national security world is still operating under a two conflicting paradigms: stovepipes within which authorized users have access to everything in the stovepipe (more or less); and isolated stovepipes in which external authorized users have to spend 25% of their time gaining access to 80+ databases (or worse, don’t bother), and …

Robert Garigue: When Everything Else is Distributed….

Core Point:  It is not possible to have centralized cyber-anything if both the human end-users and all of the (multi-media and multi-lingual) data is distributed.  This is especially true of security, which is historically several steps behind mission area processes to begin with, and any form of top-down “regulation” that tends to appear after the …

Tom Atlee Proposes distributed-intelligence, crowd-sourcing participatory think tank for popular common-sense policies, unhindered by party affiliations and ideology

Phi Beta Iota: There is no other person we hold in higher esteem than Tom Atlee.  For America the Beautiful, at least, he is this generation’s Wise Man.  Below in his own words.  We urge one and all to contribute to his sustenance. . . . . . . . . . . . . …

Undersea Cables: The Achilles Heel of our Economies

Franz-Stefan Gady Foreign policy analyst, EastWest Institute Huffington Post, Posted: December 21, 2010 02:20 PM In December 2008 within milliseconds, Egypt lost 70 percent of its connection to the outside Internet. In far away India, 50 to 60 percent of online connectivity similarly was lost. In Pakistan, 12 million people were knocked offline suddenly, and …

Reference: Private Military Corporations–A Non-State Actor-Nuclear Terror Nexus?

Private Military Corporations: A Non-State Actor-Nuclear Terror Nexus? Robert L. Brown Temple University August 16, 2010 Abstract: The risk of nuclear terrorism is hyped by some as possible and high consequence (Allison 2006) while others dismiss the strategy as too difficult and too risky for terrorist organizations (Jenkins 2008). However, analysts have no data from …