Reference: Advanced Cyber-IO (First Cut)

Advanced Cyber/IO, Computer/online security, Corruption, Cultural Intelligence, DoD, Government, Military, Monographs, Officers Call, Policies, Real Time, Threats

The below was inspired by a close look at the evolving concept of cyber-commands.  In our judgment, LtGen Keith Alexander, USA and those in charge of the various service cyber-commands are headed for spectacularly expensive failure, minor operational successes not-with-standing.  The officers concerned are well-intentioned, precisely like their predecessors who chose to ignore precisely the same insights published in 1994–they simply lack the intestinal fortitude to break with the past and get it right for a change.  What they plan is the cyber equivalent of “clear, hold, build,” and just as mis-guided.  They are out of touch with reality and will remain so.  They will all be happily retired long before the predictable recognition of their failure occurs, and the next generation of young flags will make the same mistakes again…and again…until we get an honest President with an honest Office of Management and Budget (OMB) able to demand and enforce integrity across the board.

Draft Monograph on Cyber-Command

See Also:

Continue reading “Reference: Advanced Cyber-IO (First Cut)”

Review: Global Warming False Alarm–The Bad Science Behind the United Nations’ Assertion that Man-made CO2 Causes Global Warming

5 Star, Communications, Corruption, Crime (Government), Economics, Environment (Problems), Environment (Solutions), Games, Models, & Simulations, Information Operations, Intelligence (Government/Secret), Intelligence (Public), Media, Misinformation & Propaganda, Peace, Poverty, & Middle Class, Politics, Power (Pathologies & Utilization), Priorities, Science & Politics of Science, Secrecy & Politics of Secrecy, Survival & Sustainment, Threats (Emerging & Perennial), True Cost & Toxicity, United Nations & NGOs, Values, Ethics, Sustainable Evolution, Voices Lost (Indigenous, Gender, Poor, Marginalized)
Amazon Page
Amazon Page

5.0 out of 5 stars Righteous Good SLAM of IPCC Fraud & Intimidation

November 26, 2009
Ralph B. Alexander
I read a lot, and I confess to have been among those who “bought in” to the celebrity alarmism of Al Gore, but I never displaced the totality of the threats to Earth for an obsessive focus on carbon emissions. Among the three books I have always recommended that are far more balanced than anything by the International Panel on Climate Change (IPCC) are:

High Noon 20 Global Problems, 20 Years to Solve Them
The Future of Life
Plan B 3.0: Mobilizing to Save Civilization (Substantially Revised)

That having been said, I was generally supportive of the Kyoto Treaty and the concept of carbon reductions.

Then I read The Resilient Earth: Science, Global Warming and the Fate of Humanity and within weeks, read Cool It: The Skeptical Environmentalist’s Guide to Global Warming (Vintage) and finally, just the past week, noticed the Hacktivism that outed all of the fraud and deception in the Climate Research Unit central to the IPCC (Climate Change Fraud is now a global meme).

Continue reading “Review: Global Warming False Alarm–The Bad Science Behind the United Nations’ Assertion that Man-made CO2 Causes Global Warming”

Worth a Look: Literature in Rebuttal of Global Warming

03 Environmental Degradation, Communities of Practice, Earth Intelligence, Ethics, Key Players, Policies
Amazon Page
Amazon Page

Global Warming False Alarm: The Bad Science Behind the United Nations’ Assertion that Man-made CO2 Causes Global Warming

In language that a layman can understand, Ralph Alexander explains how the whole global warming claim got started, who started it, and how it has been maintained by too many scientists (and others) using deliberately false or distorted science. – Bookviews by Alan Caruba

Amazon Page
Amazon Page

Heaven and Earth: Global Warming, the Missing Science

‘This is a very powerful, clear, understandable and extremely useful book . . . [Plimer] convincingly criticizes the UN, the IPCC, U.K. and U.S. politicians, as well as Hollywood show business celebrities. He strictly distinguishes science from environmental activism, politics, and opportunism.’—Vaclav Klaus, President, The European Union

global warming three
Amazon Page

Dr. Richard Lindzen–Professor of Meteorology at M.I.T., member, the National Research Council Board on Atmospheric Sciences and Climate, says global warming alarmists “are trumpeting catastrophes that couldn’t happen even if the models were right.”  …  and many others

Amazon Page
Amazon Page

Red Hot Lies: How Global Warming Alarmists Use Threats, Fraud, and Deception to Keep You Misinformed

From the author of the New York Times bestselling Politically Incorrect Guide(tm) to Global Warming (and Environmentalism) comes Red Hot Lies, an exposé of the hypocrisy, deceit, and outright lies of the global warming alarmists and the compliant media that support them. Did you know that most scientists are global warming skeptics? Or that environmental alarmists have knowingly promoted false and exaggerated data on global warming? Or that in the Left’s efforts to suppress free speech (and scientific research), they have compared global warming dissent with “treason”?  Shocking, frank, and illuminating, Chris Horner’s Red Hot Lies explodes as many myths as Al Gore promotes.

Continue reading “Worth a Look: Literature in Rebuttal of Global Warming”

Journal: Government Corruption and Inattention; Foreign Influence and Access: Religious Counterintelligence

Ethics

Phi Beta Iota: We started thinking about religious counterintelligence in 2003, after reading Robert Maxwell, Israel’s Superspy: The Life and Murder of a Media Mogul, at which point we concluded that we not only needed an FBI division for commercial counter-espionage, but a religious division as well, one able to track not just Islamic support to terrorism, but Jewish, Catholic, Mormon and other penetrations of the U.S. Government working against the public interest.  This all has to be understood in the context of a government that has sold out deliberately at the political level to 42 or 44 dictators and particularly to Israel and Saudi Arabia–regardless of which party is in power, they are not being held accountable for their broad betrayals of the public trust, hence, if the FBI won’t do it, this needs to be a public intelligence initiative, with a special focus on dual citizens of Israel and USA (see below the fold).

Full Story Online
Full Story Online

We were looking at Richard Perle and Douglas Feith. They had a list of individuals in the Pentagon broken down by access to certain types of information. Some of them would be policy related, some of them would be weapons-technology related, some of them would be nuclear-related. Perle and Feith would provide the names of those Americans, officials in the Pentagon, to Grossman, together with highly sensitive personal information: this person is a closet gay; this person has a chronic gambling issue; this person is an alcoholic. The files on the American targets would contain things like the size of their mortgages or whether they were going through divorces. One Air Force major I remember was going through a really nasty divorce and a child custody fight. They detailed all different kinds of vulnerabilities.

The epicenter of a lot of the foreign espionage activity was Chicago.

Continue reading “Journal: Government Corruption and Inattention; Foreign Influence and Access: Religious Counterintelligence”

Reference: Mobile Learning Displaces Distance Learning, Offers Hope for Five Billion Poor

Articles & Chapters, Mobile

COmplete PDF Online
COmplete PDF Online

2004

Going Nomadic: Mobile Learning in Higher Education

EDUCAUSE Review, vol. 39, no. 5 (September/October 2004): 28–35.

Bryan Alexander

The combination of wireless technology and mobile computing is resulting in escalating transformations of the educational world. The question is, how are the wireless, mobile technologies affecting the learning environment, pedagogy, and campus life? To answer this question, we must assess the current state of affairs, surveying cyberculture globally and historically.1 We must consider the United States only peripherally, since it lags behind other parts of the world in several key trends. And we must carefully examine the wireless, mobile learning experience as it rapidly develops, doing our best to grasp emergent trends.

Policy Archives on Public Intelligence (1992-2006)

Policy

2006

US

PolicyDoDQDR Shift in Focus 18 Years After Gray and Steele Recommended Same

2006

US

PolicyMarkowitzDefense Science Board Report on Transitions (NGO, OSINT)

2006

US

PolicyPetersCounterrevolution in Military Affairs

2006

US

PolicySteeleTerms of Reference for Intelligence Reform 1.1

2006

US

PolicySteeleIn Search of a Leader (Four Essential Reforms)

2006

US

PolicySteeleElectoral Refrom as Precursor to Intelligence Reform

2006

US

PolicyTsuruokaManaging for the Future: Interview with Alvin Toffler

2005

US

PolicyAndreggEthics and the IC: Breaking the Laws of God and Man

2005

UK

PolicyBASICThink Tank Report on US Intelligence Incompetence

2005

EU

PolicyEUEuropean Union Proposed Multi-National Intelligence Service

2005

US

PolicyGodsonCulture of Lawfullness

2005

US

PolicySteeleON INTELLIGENCE: Overview in Aftermath of 9-11

2005

US

PolicySteeleOp-Ed on Condi Rice’s Active Deception

2005

US

PolicySteeleCease and desist letter on Naquin

2005

US

PolicyTamaPrinceton Review on Intelligence Reform

2004

US

PolicyAlexanderArmy G-2 Accepts OSINT as Separate Discipline

2004

US

PolicyAndreggInsanity of Planned Intelligence “Reforms”

2004

AU

PolicyAnon & SteeleUpdate on OSINT in Australia

2004

FR

PolicyClercCognitive Knowledge for Nations

2004

US

PolicyCordesmanQuestions & Answers on Intelligence Reform

2004

US

PolicyCordesman & SteeleQuestions & Answers on Intelligence Reform

2004

US

PolicySimmonsCongressman Simmons Letter to General Schoomaker on OSINT

2004

US

PolicySteeleDoD OSINT Program: One Man’s View of What Is Needed

2004

US

PolicySteeleTranscript of Steele at Secretary of State’s Open Forum 24 March 2004

2004

NL

PolicyTongeren (van)Need for Global Alliance for Human Security (Complete)

2004

NL

PolicyTongeren (van)Need for Global Alliance for Human Security (Overview)

2003

US

PolicyCzechSteady State Revolution and National Security

2003

CA

PolicyFyffeIntelligence Sharing and OSINT

2003

CA

PolicyFyffeIntelligence Sharing and OSINT (Summary)

2003

UN

PolicyLewisCreating the Global Brain

2003

US

PolicyMarkowitzOSINT in Support of All Source

2003

US

PolicyMarkowitzOpen Source Intelligence Investment Strategy

2003

US

PolicySteeleOpen Letter to Ambassadors Accredited to the USA

2003

BE

PolicyTruyensIntelligent vs. Intelligence: That Is The Question

2002

Italy

PolicyPoliti11th of September and the Future of European Intelligence

2001

US

PolicyHeibelIntelligence Training: What Is It?  Who Needs It?

2001

US

PolicyHeibelValue of Intelligence & Intelligence Training to Any Organization

2001

US

PolicyOakleyUse of Civilian & Military Power for Engagement & Intervention

2000

US

PolicyBerkowitzAn Alternative View of the Future of Intellligence

2000

RU

PolicyBudzkoRussian View of Electronic Open Sources and How to Exploit Them

2000

US

PolicyErmarthOSINT: A Fresh Look at the Past and the Future

2000

IT

PolicyPolitiThe Birth of OSINT in Italy

1999

US

PolicyAllen (ADCI/C)OSINT as a Foundation for All-Source Collection Management

1999

UK

PolicyRolingtonChanging Messages in Western Knowledge Over 400 Years (Slides)

1999

UK

PolicyRolingtonChanging Messages in Western Knowledge Over 400 Years (Text)

1999

UK

PolicySteeleSnakes in the Grass: Open Source Doctrine

1998

US

PolicyDonahueBalancing Spending Among Spies, Satellites, and Schoolboys

1997

FR

PolicyBotbolThe OSINT Revolution: Early Failures and Future Prospects

1997

US

PolicyFelsherViability & Survivability of US Remote Sensing as Function of Policy

1997

US

PolicySteeleIntelligence in the Balance: Opening Remarks at OSS ‘97

1997

US

PolicySuttonGlobal Coverage ($1.5B/Year Needed for Lower Tier OSINT)

1997

US

PolicyTsuruokaAsian Perceptions of What Is and Is Not Legal in Economic Intelligence

1997

UK

PolicyTyrrellProposals to Develop a NATO/PfP OSINT Capability

1996

FR

PolicyClercEconomic and Financial Intelligence: The French Model

1996

US

PolicyKahinWhat Is Intellectual Property?

1996

US

PolicySteeleCreating a Smart Nation (Govt Info Q and also CYBERWAR Chapter)

1996

US

PolicySteeleInfoPeace: OSINT as a Policy Option & Operational Alternative

1996

US

PolicySteeleOpen Sources and the Virtual Intelligence Community

1996

US

PolicySteeleProtecting the Civilian Infrastructure as an Aspect of Information Warfare

1996

US

PolicyZuckermanThe Central Role of Open Source Economic Intelligence

1995

US

PolicyPrusakSeven Myths of the Information Age

1995

US

PolicySteeleConference Executive Summary C/HPSCI and former DCI Colby

1995

US

PolicySteeleCreating a Smart Nation: Strategy, Policy, Intelligence, & Information

1995

US

PolicySteeleSMART NATIONS: NI Strategies and Virtual Intelligence Communities

1994

US

PolicyOgdin & GiserCyber-Glut, and What To Do About It

1994

FR

PolicySchmidtOpen Source Solutions 1994: The State of Intelligence

1994

US

PolicySchwartauLetter on NII Security

1994

US

PolicySchwartau et alCross-Walk of 3 Experts’ Spending $1 Billion per Year for NII Security

1994

US

PolicySteeleCommunications, Content, Coordination, and C4 Security: Talking Points

1994

US

PolicySteeleCorrespondence to Mr. Marty Harris, NII Commission

1994

US

PolicySteeleDATA MINING: Don’t Buy or Build Your Shovel Until You Know What…

1994

US

PolicySteeleExpansion of Questions Posed by Senator John Warner to Aspin-Brown

1994

US

PolicySteeleLetter to the Open Source Lunch Club on PFIAB Being Useless

1994

US

PolicySteeleNational and Corporate Security in the Age of Information

1994

US

PolicySteelePrivate Enterprise Intelligence: Its Potential Contribution to Nat’l Sec.

1993

FR

PolicyBeaumardFrance: Think-tank to Anticipate & Regulate Economic Intelligence Issues

1993

FR

PolicyBeaumardLearned Nations: Competitive Advantages Via Knowledge Strategies

1993

US

PolicyBrennerLaw and Policy of Telecommunications and Computer Database Networks

1993

US

PolicyCastagnaReview of Reich, The Work of Nations

1993

AU

PolicyChantlerNeed for Australia to Develop a Strategic Policy on OSI

1993

US

PolicyCislerCommunity Computer Networks

1993

US

PolicyCivilleThe Spirit of Access: Equity, NREN, and the NII

1993

US

PolicyFedanzoA Genetic View of National Intelligence

1993

US

PolicyHaverIntelligence Aim Veers to Amassing Overt Information

1993

JP

PolicyKumonJapan and the United States in the Information Age

1993

SE

PolicyLeijonhelmEconomic Intelligence Cooperation Between Government Industry

1993

US

PolicyLoveComments on the Clinton Administration’s ‘Vision’ Statement for the NII

1993

US

PolicyPetersenA New Twenty-First Century Role for the Intelligence Community

1993

GE

PolicySchmidtHistory of Failure, Future of Opportunity: Reinventions and Deja Vu

1993

US

PolicySteeleA Critical Evaluation of U.S. National Security Capabilities

1993

US

PolicySteeleACCESS: Theory and Practice of Intelligence in the Age of Information

1993

US

PolicySteeleExecutive Order 12356, ‘National Security Information’

1993

US

PolicySteeleReinventing Intelligence in the Age of Information (TP for DCI)

1993

US

PolicySteeleReinventing Intelligence: The Advantages of OSINT

1993

US

PolicySteeleRole of Grey Lit & Non-Traditional Agencies in Informing Policy Makers

1993

US

PolicyToffler (Both)Knowledge Strategies, Intellience Restructuring,  Global Competitiveness

1993

US

PolicyWallnerOverview of IC Open Source Requirements and Capabilities

1993

US

PolicyWoodThe IC and the Open Source Information Challenge

1992

US

PolicyBarlowEFF and the National Public Network (NPN)

1992

US

PolicyCastagnaReview of Toffler’s PowerShift

1992

SE

PolicyDedijerOpen Source Solutions: Intelligence and Secrecy

1992

US

PolicyGageOpen Sources, Open Systems

1992

US

PolicyGreenwaldUnrepresented Nations & Peoples Organization: Diplomacy’s Cutting Edge

1992

US

PolicyHughesAn Affordable Approach to Networking America’s Schools

1992

US

PolicyKahinNew Legal Paradigms for Multi-Media Information in Cyberspace

1992

US

PolicyKahnOutline of a Global Knowledge Architecture, Visions and Possibilities

1992

US

PolicySteeleE3i: Ethics, Ecology, Evolution, and Intelligence

1992

US

PolicySteeleInaugural Remarks Opening 1st International Conference

1992

US

PolicySteeleInformation Concepts & Doctrine for the Future

1992

US

PolicySteeleOSINT Clarifies Global Threats: Offers Partial Remedy to Budget Cuts

1992

US

PolicySteeleReview Strassmann, Information PayOff

1992

US

PolicyWoodRemarks, Don’t Be Suspicious of Contractors

1991

US

PolicyJFK Working GroupNational Intelligence and the American Enterprise: Possibilities

1991

US

PolicyKarrakerHighways of the Mind

1991

US

PolicySteeleHow to Avoid Strategic Intelligence Failures in the Future

1990

US

PolicySteeleRecasting National Security in a Changing World

1957

US

PolicyWrightProject for a World Intelligence Center