Reflections on Specific Intelligence Reforms (Including Alarm on NSA from 1994 Onwards)

The US IC has spent 1.2 trillion dollars since 1992 — and failed to provide ethical evidence-based decision-support capable of influencing tens of trillions more. This waste has to be understood in the context of a leadership (both intelligence and political)  focused moving money, not actually in the business of producing decision-support or making decisions …

Reflections: Policy Makers and Social Science — Distant & Lacking Value-Added Decision-Support

Carnegie and the Stimson Center are exploring the distant and largely dysfunctional relationship between policy makers and the social sciences. This is an important topic that could usefully be expanded to explore the similar distance between government and the other information tribes.* Below are two seminal references in this area. Carnegie Stimson National Security Programs …

Reflections on Intelligence Reform

SHORT URL: http://tinyurl.com/2014-Reform Security sector reform and advancement begins in the mind.  In the 21st Century, raw information and tailored intelligence (decision support) are fundamental to progress at the strategic, operational, tactical, and technical levels. If we are to properly address intelligence governance from a comparative and international perspective rooted in an appreciation for the …

Rickard Falkvinge: Zacqary Adam Green – Reflections on Property

Ideas Can’t Be Property. Can Dirt? Reflections – Zacqary Adam Green:  So, we’re all in agreement that intellectual property is a bad thing that should not exist. What about plain old property? If no one has a right to monopolize the use of an idea, is there a justification to allow monopolies on the use …

Reflections on Tired Databases versus Wired Analytics + Jack Davis & Analytic Tradecraft RECAP

There are multiple analytic flaws with most source data, and particularly with any source data labeled in relation to terrorism. If Israelis have have touched the data in any way, shape, or form (especially including the software), it must be considered contaminated and severely suspect.  While I have nothing critical to say about the application …