Reflections on Intelligence Reform

SHORT URL: http://tinyurl.com/2014-Reform Security sector reform and advancement begins in the mind.  In the 21st Century, raw information and tailored intelligence (decision support) are fundamental to progress at the strategic, operational, tactical, and technical levels. If we are to properly address intelligence governance from a comparative and international perspective rooted in an appreciation for the …

Chris Hodges: What Obama Really Meant — a Literal Interpretation of His NSA Speech

Published on Monday, January 20, 2014 by TruthDig.com What Obama Really Meant Was … by Chris Hedges Remarks by the President on Review of Signals Intelligence(if he had told the truth)Department of Injustice Washington, D.C. 11:15 a.m. EST THE PRESIDENT: A small, secret surveillance committee of goons and thugs hiding behind the mask of patriotism …

4th Media: US Navy Bottoms Up

“US Naval Might is WANING,” REALLY? On January 3 Rear Admiral Viktor Bursuk, a deputy commander of the Russian navy who oversees weapons procurement, said Russia’s Navy is expected to receive 40 new warships and auxiliary vessels in 2014. In addition to surface ships of various classes, the Navy will also commission the third Borey-class …

2014 Intelligence Reform (All Others)

SHORT URL: http://tinyurl.com/2014-Intel-Reform Under Construction – Send Nominations to robert.david.steele.vivas@gmail.com Updated 23 Jan 2014 14:58 E Phi Beta Iota: The current literature on intelligence reform is underdeveloped and under-specified.  An example of this under- or mis-specification can be seen in the treatment of 9/11. The dominant position that 9/11 was an intelligence failure is correct …

Berto Jongman: Bits, Bytes, & Stuff 2.0

BOOK: The Turning Point: Creating Resilience in a Time of Extremes Also: Radio Interview with Author BUDGET: Congress Wants More Insight into Cyber, SOF Budgets CYBER: Cyberwar Increasingly Defined By Espionage and Regional Conflicts, Argues FireEye CYBER: DDoS New Technique, Warns US-CERT CYBER: Google Spyware SMS Tracker CYBER: How Jihadists Use the Internet