Edward Snowden with Jim Bamford in WIRED: Next NSA Revelations “Would Be the Death of All of Them Politically”

Click on Image to Enlarge

Click on Image to Enlarge

The most wanted man in the world

Jim Bamford

WIRED, 13 August 2014

EXTRACTS

“It’s like the boiling frog,” Snowden tells me. “You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it. But if you do that, it creates a slippery slope that just increases over time, and by the time you’ve been in 15 years, 20 years, 25 years, you’ve seen it all and it doesn’t shock you. And so you see it as normal. And that’s the problem, that’s what the Clapper event was all about. He saw deceiving the American people as what he does, as his job, as something completely ordinary. And he was right that he wouldn’t be punished for it, because he was revealed as having lied under oath and he didn’t even get a slap on the wrist for it. It says a lot about the system and a lot about our leaders.”

Read full article with many new revelations.

Comments Off
Aug 13

2014 Robert Steele On Defense Intelligence – Seven Strikes

Robert Steele

Robert Steele

On Defense Intelligence: Seven Strikes

Why Secretary of Defense Hagel Must Choose the Next Director of the Defense Intelligence Agency

by ROBERT DAVID STEELE

CounterPunch, 2 July 2014

As the Department of Defense (DoD) prepares to change who manages the Defense Intelligence Agency (DIA), the services are vying to place their candidate without regard to the fundamentals of the position. I thought it would be useful to examine seven areas where the next Director of DIA could make a difference, provided he or she has the explicit support of the Secretary of Defense (SecDef) – otherwise these are seven strikes and that person is “out” before they begin.

Read the rest of this entry »

Comments Off
Jul 2

CRS Reference: Cybersecurity Authoritative Reports and Resources by Topic

crs logoCybersecurity: Authoritative Reports and Resources, by Topic

Rita Tehan, Information Research Specialist

Congressional Research Service, May 22, 2014

This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics:

• policy overview
• National Strategy for Trusted Identities in Cyberspace (NSTIC)
• cloud computing and FedRAMP
• critical infrastructure
• cybercrime, data breaches, and data security
• national security, cyber espionage, and cyberwar (including Stuxnet)
• international efforts
• education/training/workforce
• research and development (R&D)

In addition, the report lists selected cybersecurity-related websites for congressional and
government agencies, news, international organizations, and organizations or institutions.

PDF (101 Pages):  CRS Cybersecurity Resources 20140522

See Also:

Congressional Research Service — Index 28 MAY 2014 – Cyber & Internet Including FOI, Privacy, NSA, Etcetera

PDF (24 Pages): Self-Development for Cyber Warriors (SWJ ACC 2011)

Comments Off
May 29

2014 Robert Steele Open Letter to Vice President of the United States of America Joe Biden, The White House

Robert David STEELE Vivas

Robert David STEELE Vivas

SHORT URL: http://tinyurl.com/OSA-Biden

These materials were delivered via certified mail to the Office of the Vice President on Monday 5 May 2014.

There is a better than even chance that the IC “minder” controlling the Vice President’s correspondence intercepted the package and the Vice President is therefore unwitting of this official certified as delivered communication.

1 May 2014 Letter to VP
Biden Six Slides
Open Source Agency Synopsis 2014
2014 Smart Nation Act (Simplified)
USPS Shipment Info for 9502600036814121000268

ADDENDUM: The OSA will be the premier decision-support organization in the world, promulgating the proven process of decision-support (requirements definition, collection management, source discovery and validation, multi-source fusion, geospatially-rooted processing, inter-disciplinary analysis, and open transparent action-enabling production). The OSA will also be the only USG element that provides Congress and the Executive with identical decision-support also shared with the public, and the only USG element that is “all in” on M4IS2/OSE. For those that have asked about personnel, tables of organization, budgets, etcetera — at this level of play, decisions are made on one line and a number. OMB has set the numbers — $125M IOC toward $2-3B FOC. My personal view is that the organization should consist of no more than  120 full-time personnel within the HQ element on the South-Central Campus. Spending will be focused on individual minds in every clime and place, and on incentivizing coalitions among the eight tribes across all boundaries. The School of Future-Oriented Hybrid Governance, the World Brain Institute, and the EarthGame will be independent subsidized elements manned by rotational personnel on sabatical — gatherings of eagles from across all nations, agencies, disciplines, and domains.

M4IS2: Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing and Sense-Making

OSE: Open Source Everything — the only affordable, inter-operable, scalable, and therefore sustainable global approach to engineering

Full Text Below the Fold — Use Translate Box to Read in Other Languages

全文下方折 – 使用转换盒来阅读其他语言
Texte intégral en dessous du pli - Utiliser Traduire Boîte à lire dans d’autres langues
Полный текст ниже раза - Использование Перевести Box читать на других языках
पूर्ण पाठ तह के नीचे - उपयोग अन्य भाषाओं में पढ़ने के लिए बॉक्स अनुवाद
Texto completo abaixo da dobra - Utilize Caja Traduzir para ler em outros idiomas
Teks Penuh Di bawah Lipat - Gunakan Terjemah Box untuk Baca dalam Bahasa Lain
Texto completo debajo de la tapa - Utilizar Caja de Traducion para leer en otros idiomas Volledige tekst onder de vouw - Inzetten Vertalen Box te lezen in andere talen

Read the rest of this entry »

Comments Off
May 17

American Veterans May Become American Guerrillas — Police Planning & Arming Against US Veterans

Who?  Who?

Who? Who?

American Vets May Become American Guerrillas When the SHTF in the USA

Despite what seems like an endless parade of stories about federal government stupidity and malfeasance repetitively emerging over years and decades, there are a few in government who have brains, who think and connect the dots, at least in connection to the ever enlarging presence of American veterans who know tactics and strategy and how to make and use weapons. Such thinkers have, as part of their responsibility to look after the interests of their elite 1% masters, surely recognized, in light of the developments mentioned in this article, the threat American veterans trained in warfare may represent to their elite master’s interests as the economy implodes due to their master’s machinations:
“In an interview with Fox 59, a Morgan County, Indiana Police Sergeant admits that the increasing militarization of domestic police departments is partly to deal with returning veterans who are now seen as a homegrown terror threat. Sgt. Dan Downing of the Morgan County Sheriff’s Department states, “When I first started we really didn’t have the violence that we see today,” adding, “The weaponry is totally different now that it was in the beginning of my career, plus, you have a lot of people who are coming out of the military that have the ability and knowledge to build IEDs and to defeat law enforcement techniques…Indiana seems to be a major trial balloon for the militarization of law enforcement given that the Indiana National Guard has also just purchased two military UH-72 Lakota helicopters which will also be used by local police and the DHS for “homeland security missions”. Downing’s claim that armored tanks are necessary to deal with violent crime doesn’t jive with actual statistics which suggest that violent crime is in fact on the decrease.

Read the rest of this entry »

Comments Off
May 16

Mini-Me: US Intelligence Community’s Kodak Moment — IMPLOSION — Comment by Robert Steele

Who?  Mini-Me?

Who? Mini-Me?

Huh?

The U.S. Intelligence Community’s Kodak Moment

The game is changing rapidly. Can Washington’s intelligence community keep up?

Josh Kerbel

National Interest, 15 May 2014

Josh Kerbel is the Chief Analytic Methodologist at the Defense Intelligence Agency. He writes often and openly on the intersection of government (especially intelligence) and globalization. The views expressed in this article are his alone and do not imply endorsement by the Defense Intelligence Agency, the Department of Defense or the US Government.

Click on Image to Enlarge

Click on Image to Enlarge

In 2012, the once-mighty Eastman-Kodak company declared bankruptcy. It was an event that should have reverberated strongly with the United States Intelligence Community (IC)—and not just due to the obvious connection between imaging and spying. Rather, it should have resonated because in Kodak the IC could have glimpsed a reflection of itself: an organization so captivated by its past that it was too slow in changing along with its environment.

To understand the IC’s similar captivation and lethargy—to remain focused on classified collection in an era of increasingly ubiquitous, useful and unclassified data—one must first understand the type of problem around which the modern IC business model remains designed: the Soviet Union. The Soviet Union was fundamentally a collection problem. That is to say, it was a closed system (i.e., a discrete entity) with clear edges and a hierarchical governance structure. Given that nature, knowing what was happening in the Soviet Union required the use of classified means of collection—most of which the IC alone possessed.

Read the rest of this entry »

Comments Off
May 15

Berto Jongman: US Intelligence Community Needs a New Workforce Model

Berto Jongman

Berto Jongman

The Intelligence Community Needs a New Workforce Model

It’s a new world for the 17 agencies within the intelligence community. Their budgets are shrinking in the face of an undiminished threat landscape and a growing list of cyber-adversaries.

The IC can do a lot of things, but it can’t make money grow on trees. It faces a grand workforce challenge: Smaller budgets. Reduced hiring. Increased uncertainty. The problems are magnified significantly during national security events that require a surge of talent.

Click on Image to Enlarge

Click on Image to Enlarge

With all that in mind, the Intelligence and National Security Alliance developed a task force of former senior intelligence officials and stakeholders from industry and academia to explore potential solutions. The resulting white paper released May 7,  titled “Smart Change II: Preparing the Intelligence Community Workforce for an Evolving Threat and Fiscal Environment,” is a sequel to an initial INSA-led effort in 2011.

The white paper outlines several ways the IC could ensure a continuous assessment of strategic risk related to workforce reductions and proposes an overarching framework for civilian, military and contractor components of the IC that would guide strategic planning and management decisions.

“Budget constraints are the reality now,” said Deborah Kircher, Chief Human Capital Officer for the Office of the National Director of Intelligence, speaking at a Strategic Manpower Planning event hosted by Nextgov.

Read rest of article.

 

Comments Off
May 10

GEOINT State of the World

Below is the GEOINT State of the World* as of 1990. With excellent intentions — and major advances in technology, third-party collection, and commercial methods — NGA’s Map of the World has advanced tangibly and is to be praised. In that context, it would be useful to have an authoritative appraisal of precisely where we are today, in 2014, with respect to 1:50,000 combat charts, with contour lines and current cultural features, country by country, and with respect to 1:20:000 combat charts, city by city, port by port. This should include a deliberate recognition of many instances where GPS data and hand-held terminals are sufficient, along with a measured commitment to ensure that the infantry — 4% of the force, 80% of the casualties, 1% of the budget — is provided for in all the other instances where only a real map will do.

Click on Image to Enlarge

Click on Image to Enlarge

Click on Image to Enlarge

Click on Image to Enlarge

Source

Read the rest of this entry »

Comments Off
Apr 25

Mini-Me: Veterans Die While Waiting Up to a Year for VA Medical Appointments — Secret List Used to Conceal Gross Dereliction of Duty

Who?  Mini-Me?

Who? Mini-Me?

Huh?

A fatal wait: Veterans languish and die on a VA hospital’s secret list

(CNN) – At least 40 U.S. veterans died waiting for appointments at the Phoenix Veterans Affairs Health Care system, many of whom were placed on a secret waiting list.

The secret list was part of an elaborate scheme designed by Veterans Affairs managers in Phoenix who were trying to hide that 1,400 to 1,600 sick veterans were forced to wait months to see a doctor, according to a recently retired top VA doctor and several high-level sources.

For six months, CNN has been reporting on extended delays in health care appointments suffered by veterans across the country and who died while waiting for appointments and care. But the new revelations about the Phoenix VA are perhaps the most disturbing and striking to come to light thus far.

Internal e-mails obtained by CNN show that top management at the VA hospital in Arizona knew about the practice and even defended it.

Dr. Sam Foote just retired after spending 24 years with the VA system in Phoenix. The veteran doctor told CNN in an exclusive interview that the Phoenix VA works off two lists for patient appointments:

Read the rest of this entry »

Comments Off
Apr 23

Reference: US Air Force Technology Horizons 2010-2030

Categories: DoD,Military

PDF (238 Pages): Technology Horizons: A Vision for Air Force Science & Technology 2010-203o

As published in 2010.

EXTRACT

OVERARCHING THEMES FOR AIR FORCE S&T 2010–30

Read the rest of this entry »

Comments Off
Apr 22