Join 3,513 readers in helping fund MetaFilter (Hide)

8 posts tagged with intelligence by scalefree.
Displaying 1 through 8 of 8.

Related tags:
+ (44)
+ (28)
+ (27)
+ (24)
+ (23)
+ (20)
+ (19)
+ (18)
+ (18)
+ (17)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (11)
+ (11)
+ (10)
+ (10)
+ (9)
+ (9)
+ (9)
+ (9)
+ (8)
+ (8)
+ (8)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (5)
+ (4)
+ (4)
+ (4)
+ (4)


Users that often use this tag:
homunculus (14)
Postroad (10)
scalefree (8)
kliuless (7)
zarq (7)
the man of twists ... (6)
digaman (5)
Ignatius J. Reilly (5)
darth_tedious (4)
The Whelk (4)
kirkaracha (4)
Gyan (4)
specialk420 (3)
y2karl (3)
anemone of the state (3)
cthuljew (2)
Mean Mr. Bucket (2)
Foci for Analysis (2)
reenum (2)
flapjax at midnite (2)
Artw (2)
infini (2)
mystyk (2)
Smedleyman (2)
hank_14 (2)
troutfishing (2)
jack_mo (2)
amberglow (2)
bas67 (2)
donkeyschlong (2)
MiguelCardoso (2)
stbalbach (2)
rushmc (2)
netbros (2)
tranquileye (2)
owillis (2)

Open Sourcing Intelligence Analysis

In an age of information wealth, how do we decide what's true & what's not? Allow me to introduce the world of discussion mapping. First up we have zest (demo here), a simple tool for threading mailing lists for easier navigation. It lacks the advanced features of the others but it's an easy starting point for structuring your discussions. [more inside]
posted by scalefree on Jan 10, 2011 - 6 comments

Just because you're paranoid doesn't mean they're not out to get you

From a 2008 document titled "Wikileaks.org—An Online Reference to Foreign Intelligence Services, Insurgents, or Terrorist Groups?" (PDF) produced by the Cyber Counterintelligence Assessments Branch of the Army Counterintelligence Center:
(S//NF) Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and whistleblowers who pass information to Wikileaks.org personnel or who post information to the Web site that they will remain anonymous. The identification, exposure, or termination of employment of or legal actions against current or former insiders, leakers, or whistleblowers could damage or destroy this center of gravity and deter others from using Wikileaks.org to make such information public.

posted by scalefree on Mar 15, 2010 - 31 comments

Who Watches the Watchmen?

In February President Bush issued an Executive Order changing the role & reporting structure of the PFIAB, the President's Foreign Intelligence Advisory Board. At the time the order was criticized & analyzed as a move to consolidate power within an organization that was already full of Bush cronies. But it now looks like all the pundits were wrong. The real reason? There was a spy in the PFIAB.
posted by scalefree on Aug 21, 2008 - 33 comments

Church Committee 2.0: TSP, Main Core & PROMIS?

Is Congress gearing up to hold a new American Truth Commission? What new horrors would they find if they did? The last time we tried this we uncovered MK/ULTRA, plots to kill Castro & Project SHAMROCK. One of the most significant outcomes was a little thing called FISA. After 30 years it may finally be time to wash out our national dirty laundry again.
posted by scalefree on Jul 23, 2008 - 45 comments

If at first (or second) you don't succeed...

Operation PLIERS. An internal CIA memorandum has been obtained by Venezuelan counterintelligence from the US Embassy in Caracas that reveals a plan to destabilize Venezuela during the upcoming constitutional referendum. The plan, titled "OPERATION PLIERS" was authored by CIA Officer Michael Middleton Steere and was addressed to CIA Director General Michael Hayden in Washington. The full text of the memo will be released soon for verification purposes. Many previously.
posted by scalefree on Nov 28, 2007 - 42 comments

You can read this but then I'll have to kill you

The NSA Bibliographies The NSA internally publishes thousands of papers every year, on every topic from spycraft to cryptography to physics & aliens (no, really!). Each year the titles of these papers gets indexed & those indexes are also published internally. The Memory Hole has made a successful FOIA request for a large number of these, spanning almost 50 years. We don't get to see the actual papers, but just the titles are fascinating - including such page turners as "Computer Virus Infections: Is NSA Vulnerable?", "KAL 007 Shootdown: A View from [redacted]", "NSA in the Cyberpunk Future", "Telephone Codes and Safe Combinations: A Deadly Duo", "Coupon Collecting and Cryptology", "Cranks, Nuts, and Screwballs" & my personal favorite, "Key to the Extraterrestrial Messages". When you're done browsing the titles, there's a sample form you can use to request some of the documents yourself!
posted by scalefree on Oct 2, 2006 - 10 comments

Stealing al-Qa`ida's Playbook

Stealing al-Qa`ida's Playbook (PDF)
If you know the enemy and know yourself, your victory will not stand in doubt; if you know Heaven and know Earth, you may make your victory complete. - Sun Tzu

In 2005 Harvard's Olin Institute for Strategic Studies & West Point's Combating Terrorism Center worked together to translate what appears to be one of the most important works defining al Qaeda's strategic goals & methods, Management of Savagery (PDF) by al Qaeda strategist Abu Bakr Naji. Then they analyzed it along with three other al Qaeda works: Knights Under The Banner of The Prophet by Ayman al-Zawahiri, Between Two Methods by Abu Qatada and Observations Concerning the Jihadi Experience in Syria by Abu Mus’ab al-Suri. The result is Stealing al-Qa`ida's Playbook (PDF) (also Google cached HTML). If you want to understand more of al Qaeda than the simplistic cant that "they're evil", these two books are the place to start.
posted by scalefree on Jun 27, 2006 - 26 comments

Validating Van Riper

“You are not to use electronic communication or even land lines when communicating.” Remember the Millennium Challenge '02 wargames (previously discussed here)? To refresh your memory, Lt. Gen. Paul Van Riper (ret.), playing the part of the enemy, sank half the American fleet using a host of unconventional tactics including using motorcycle messengers to avoid radio interception. The embarrassed Pentagon game masters restarted the game & forced Van Riper to use more conventional tactics that guaranteed a win by the Good Guys. Well it looks like the Iraqi insurgents have picked up a play from Van Riper's book. Flyers are being distributed throughout Iraq urging fighters to stop using cellphones, landline phones & the Internet for communications because the US Army is intercepting them & tracking down the rebel cells. Score one for open source warfare. [via]
posted by scalefree on May 26, 2006 - 55 comments

Page: 1