ALL HYPED SHOOTINGS = Northcom/MIC's "URBAN SUNRISE" plan to take over America

Author Topic: ALL HYPED SHOOTINGS = Northcom/MIC's "URBAN SUNRISE" plan to take over America  (Read 72834 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
URBAN SUNRISE
Synthetic Urban Networks and Relationships
Intelligence and Simulation Environment

Available online at:  http://handle.dtic.mil/100.2/ada421528

Executive Summary

The URBAN SUNRISE seedling has explored the potential to enhance military urban operations planning and execution, by providing new civil intelligence preparationanalysis and effects based operations (EBO) planning capabilities to the urban warfighters and occupying civil administrations. The capability will provide a comprehensive capability for construction of urban civil intelligence and will allowdynamic effects-based operations analyses to coordinate administrative, information, and military security operations for greatest effects.

Overview The recommended DARPA program will develop the predictive analytic capability to represent, model and evaluate effects of operations on urban civil populations and opposition organizations (e.g. belligerents, terrorists, etc.) The approach follows a “three-domain” urban model that acknowledges the need to model human organizational behavior (cognitive domain), information paths and structures (information domain) and the physical infrastructure of the urban area of interest (physical domain). The URBAN SUNRISE capability will allow static description and dynamic simulation of the three urban domains providing visualization and explanation facilities to allow analysts and planners to explore the consequences of effects based administrative, security and information operations.

The URBAN SUNRISE program will deliver the following products:

• A demonstrated Civil Intelligence and Ops-Planning Capability that includes Civil Intelligence Collection, Civil Data Fusion, and an integrated EBO Planning for Info Ops, Civil Admin and Military security. The capability will provide quantitative measures of intelligence and operations effectiveness to allow comparison of new contributions to current capabilities.

• A field-evaluated capability and supporting technologies Needed Military Capability - The focus of URBAN SUNRISE is on civil peacemaking operations, in contrast with military warfignting operations (below). While traditional military warfighting focuses on military personnel and machinery, the focus of URBAN SURISE is on civil populations, their “hearts and minds”. The focus of this program is on management of civil population perceptions, rather than the attrition of military fighting power. The required DARPA research focus will be in the areas of the cognitive and social sciences – modeling human behavior and the effects of civil affairs and military security operations to manage perceptions and wills.

URBAN SUNRISE will provide Foreign Civil Intelligence, defined as that intelligence derived from all sources regarding the social, political and economic aspects of governments & civil populations, their demographics, structures, capabilities, organizations, people, and events. (This definition has been based on consideration of several alternatives to describe civilian social, political, and economic information: 1) Civil Considerations—the political, social, economic, and cultural factors of and AOR (Army FM 3-07 para. 2.7), 2) Civil Considerations– the influence of manmade infrastructure, civilian institutions, and attitudes & activities of the civilian leaders, populations, and organizations within an AOR on the conduct of military operations (Army FM-06), and 3) “Cultural Intelligence” defined in USMC Urban GIRH; and often cited by Gen. Zinni.)

The functional operations needed to implement URBAN SUNRISE (above) include several phases of activity:

1. Foreign Civil Collection – Civil information is collected from multiple sources

2. Foreign Civil Intelligence Representation and Fusion – Civil information must be used to represent actor-organizations, the flows of influencing information and constraining urban structures. The civil data fusion process must correlate and combine civil sources (e.g. text reports, media, polls, etc.) and new technical sensing sources into parameters that update simulations models of civil populations, their governments, and the information and physical infrastructure environment within which they live and act.

3. Civil Knowledgebase – The accumulated information forms a dynamic knowledgebase of civil intelligence for 1) direct query and analysis by intelligence analysts, and 2) translation into model data for EBO simulation.

4. Effects Based Ops Analysis – Urban simulation tools allow predictive and exploratory analysis of the effects of integrated operations on the mix of civil populations and belligerent organizations.

5. Operations – Integrated operations are carried out on the basis of more comprehensive understanding of the potential interactions of actors in the complex environment.

6. Civil effects Assessment – URBAN SUNRISE must include the capability to assess predicted and actual effects, and to refine effects models on the basis of those assessments.

Required Technologies[/b] – The URBAN SUNRISE program will require the development and integration of numerous technologies in three major areas:

1. Technologies to collect, extract and representation civil data from existing and new technical sources;
• Civil behavior technical sensors
• Civil computational ontology (DAML, RKF)
• Civil automatic indicator recognition (Civil-ATR)
• Social Indicator and Concept extraction from unstructured sources
• Civil context extraction

2. Technologies for automated and semi-automated civil intelligence knowledgebase creation; creation of civil data inputs for EBO models;
• Symbolic and Cognitive entity and event fusion and tracking
• Structured Argumentation
• Concept, correlation, tracking and summarization
• Model-based recognition

3. Technologies to simulate non-military operations, civil populations, and effects; Analysis of effects in complex and highly uncertain simulations
• Human behavior Representation
• Modeling and Simulation
􀂃 Agent Based Simulation
􀂃 Social Network Analysis
• Game and Hypergame
• Complexity of effects-space analysis

Measuring Impact – The URBAN SUNRISE program will measure the impact of the contribution of the new capability at three levels: 1) Civil Population Performance Measures will quantify how increased civil intelligence will impact the timeliness, accuracy, depth of civil situation understanding. They will also quantify how increased civil cooperation leads to increased intelligence breadth, depth. 2) Operations Impact Effectiveness Measures will quantify how enhanced Civil Situation Awareness will lead to improved commander’s decision making and improved degrees of civil influence, and improved contributions to Administrative, Information, and Military Op Effectiveness (outcomes), 3) finally Military Mission Utility Measures quantify the effects on civil stability (security, productivity, health, growth, trust, etc. ).

The impact of URBAN SUNRISE must be measured relative to:

1. Current Practice – Experienced judgment, tacit knowledge

2. Alternative Military Missions – Pre-combat, combat, Stability and Support Ops

3. Alternative Operations – Administrative, Information (IO), Military security

Military Transition

- The transition parties include interested technology and operations supporters, partners, and

ultimate users,
owners and
beneficiaries.


The key parties for the new URBAN SUNRISE capability identified in the study are:

• Transition Partner – INSCOM is the logical partner, because of the Army’s primary responsibility for on-the-ground urban warfignting, control and occupation. Additionally INSCOM maintains the first IO Command, and operates the Information Dominance Center (IDC) at Ft, Belviore that develops and operationally applies capabilities such as URBAN SUNRISE.

• Transition Supporter - JFCOM J-9 has responsibility for urban warfare experimentation, and runs the annual Joint Urban Warfighter (JUW) exercises, making it the logical partner for experimentation.

• Technology Supporters – There exist a number of organizations that are supportive of these technology developments (especially effects based human dynamics simulation) for application to the complexity of urban and asymmetric warfare, including: Defense Modeling and Simulation Office (DMSO), Advanced Research and Development Activity (ARDA), MORS, and the RAND Corp.

Conceptual Program Plan – A conceptual URBAN SUNRISE program is structure in three phases (below) over a five year program. The first phase develops the key technology components, before integrating them to evaluate end-to-end capabilities in phase 2. Phase 3 will conduct filed experimentation to evaluate operational utility.

Phase 1: During phase 1,The Integrating contractor will assign MOEs to individual contractors for their technology solutions. The contractors, in turn, will be required to submit MOPs for their products as well as functional test plans for the technology they are developing. The integration contractor will write the overall test plan for this and subsequent phases, which will include working with J9 and transition partners. Products will be integrated into the program baseline on 6-month centers, and will undergo integration testing and functional testing as appropriate. The integration contractor will develop an end of phase test plan that will lead into the J9 evaluation and prove readiness for the spiral phase of user evaluation.

Phase 2: is the spiral development phase. The initial phase will evaluate the program software as developed and will directly support the program objectives established with JFCOM J9. The first spiral will include contractor training and extensive or as needed contractor support. It is anticipated that the first JFCOM J9 evaluation will be a Red Team type exercise with Civil play and intelligence derived from real world (probably Iraq) data. The second spiral will again be at the call of the J9, and will include contractor training and minimal, but as required support for the operators. The third phase will again include contractor training from mature training manuals, but the exercise will involve contractor support for trouble shooting only.

Phase 3: is the Test and Evaluation phase with the user community and the transition partner. During phase 1, and iterated in conjunction with the user community, a final test plan will be developed by the integration contractor. Normally, the user community increases user involvement as a function of system maturity which is proven through a series of evaluations. The user community will have seen the J9 tests, and may opt for a CPX (command post exercise) followed by a limited field evaluation, and finally a real world evaluation. The intention is to have prototype transition systems be used with the evolved CONOP. The critical metric will be whether the service will adopt the system and make it part of their war fighting baseline.

Summary – As evidenced in current operations in the Balkans, Afghanistan and Iraq, there exists a critical need for civil intelligence collection, fusion and civil effectsbased ops modeling and simulation to support urban combat and stability operations. This need has been articulated by the Joint Staff, the Defense Science Board and the military services as cited in this report. URBAN SUNRISE will provide civil behavior representation, fusion and predictive EBO is as high-risk, high-payoff venture, suitable for DARPA investment. INSCOM and JFCOM are suitable transition partners, eager to receive and apply the capability.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Download the white papers before they get scrubbed (basic advice):

________________________________________________________

Air University.  Air Force Doctrine Development and Education Center.  Effects-Based Operations.  (The Air and Space Power course).
Available online at:  http://www.apc.maxwell.af.mil/ebo/lesson.htm
A self-paced, interactive course.

Air University.  Air War College.  Transformation of War & U.S. Military:  Effects-Based Operations.
Available online at:  http://www.au.af.mil/au/awc/awcgate/awc-forc.htm#effects
Portion of Air War College's Gateway to the Internet providing links to other electronic publications and web pages on EBO.

An Approach to Effects Based Planning.
Available online at:  http://www.dtic.mil/jointvision/ideas_concepts/ebo_planning_template.xls
EBO planning template.

Australian Defence Force.  Directorate of Future Warfighting Concepts.  Effects Based Operations Discussion Paper.  November 2003.  34 p.
Available online at:  http://www.defence.gov.au/strategy/fwc/documents/EBO_DP.pdf

Bakken, Bjørn T. and others.  Perception and Handling of Complex Problems in Dynamic Settings--Three Cases of Relevance to Military Command and Crisis Management.  Oslo, Norway, Norwegian Defence Leadership Institute, Norwegian Defence Academy, 2004.  18 p.
Available online at:  http://www.systemdynamics.org/conferences/2004/SDS_2004/PAPERS/226BAKKE.pdf
Paper presented at the 22nd International Conference of the System Dynamics Society, Oxford, Eng., UK, July 25-29, 2004.
"To provide a basis for better understanding of the dynamics of operations, we suggest an approach linking Effects Based Operations (EBO) modelling and analysis with System Dynamics (SD) principles, yielding valuable insights in the complexity of modern warfare and conflict resolution."

Bakken, Bjørn T. and others.  The System Dynamics Approach to Network Centric Warfare and Effects Based Operations--Designing a "Learning Lab" for Tomorrow's Military Operations. Oslo, Norway, Norwegian Defence Leadership Institute, Norwegian Defence Academy, 2004.  10 p.
Available online at:  http://www.systemdynamics.org/conferences/2004/SDS_2004/PAPERS/237BAKKE.pdf
Paper presented at the 22nd International Conference of the System Dynamics Society, Oxford, Eng., UK, July 25-29, 2004.
"It is in the light of recently developed, but not yet matured, concepts such as Network Centric Warfare (NCW) and Effects Based Operations (EBO), we discuss the radically changed conditions for acting and learning in the military operational environment.  We suggest a new approach, linking the principles of best practice EBO modelling and analysis with system dynamic insights, yielding design requirements for a 'learning lab' for Network Centric Operations."

Bello, Paul and Mailman, Mitch.  Applications of Dynamic Systems Theory to Effects-Based Operations and Adversarial Modelling.  Rome, NY, Information Directorate, Air Force Research Laboratory, 2004.  10 p.  
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/021.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/021.pdf

Beres, Steven M. and others.  Effects-Based Operations:  The Yom Kippur War Case Study.  Vienna, VA, Evidence Based Research, Inc., 2004.  10 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/190.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/190.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.
This paper is a case study of American efforts at the height of tension between the superpowers during the Yom Kippur War.  It examines the important aspects of effects-based operations using the DIME construct as a tool for assessment.

Bird, Richard F.  Crisis Response, Complexity and Analysis.  2002.  16 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Bird_Response.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Brandt, Kevin L. and others.  Joint Force Command & Control:  Synchronization, Adaptation, and Coordination (SAC) Capability for Effects-Based Operations.  Suffolk, VA, MITRE Corporation, 2002.  13 p.
Available online at:  www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/089.PDF
Paper presented at the 7th Command and Control Research and Technology Symposium, Naval Postgraduate School, Monterey, CA, June 11-13, 2002.

Bryant, Russell E.  Management and Introduction of Technology--An OSD Office of Technology Transition Perspective for Effects Based Support in the New Security Environment.  Washington, Program Executive Office for Integrated Warfare Systems, Office of Technology Transition, Dept. of Defense, 2005.  22 p.
Available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/009.pdf
Briefing slides at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/presentations/009.pdf
Paper presented at the 10th International Command and Control Research and Technology Symposium, "The Future of Command and Control," June 13-16, 2005, McLean, VA.

Bullock, Richard K.  Using Influence Nets to Model a Nation-State.  Pentagon ADM, VA, Air Force Studies and Analyses Agency, January 2002.  6 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Bullock.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Burns, Carla and Caroli, Joe.  Introduction to Effects Based Operations.  January 8, 2002. 10 slides.  (Information Institute 5th anniversary workshop).
Available online at:  http://www.rl.af.mil/rrs/Info_Inst/docs/briefings_2002/II_WkShop_EBO_Overview_1_08_02.ppt

Byrnes, John.  Background Paper on System Dynamics as a Tool for Effects Based Operations (EBO) Analysis.  2002.  11 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Byrne.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Caroli, Joseph and others.  Tools for Effects Based Course of Action Development and Assessment.  Rome NY, Air Force Research Laboratory (IFSF), 2004.  15 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/052.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/052.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.

Carpenter, Michael F.  Evolving to Effects Based Operations.  Hampton, VA, MITRE Corp., 2004.  9 p.  (Draft).
Available online at:  http://www.dodccrp.org/events/9http://www.dodccrp.org/events/9th_ICCRTS/CD/papers/092.pdf
Briefing slides at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/presentations/8/092.pdf
Paper presented to the 9th International Command and Control Research and Technology Symposium, Copenhagen, Denmark, September 14-16, 2004.

Choy, Dawen.  Effects-Based Operations:  Obstacles and Opportunities.  Pointer  30, no.2:(5 p) 2004.  
Available online at:  http://www.mindef.gov.sg/imindef/publications/pointer/journals/2004/v30n2/features/feature3.html
"EBO’s biggest attraction, therefore, is that it reminds planners not to get too caught up with equations and spread-sheets, but instead to take a step back and reconsider the strategy-to-task linkages of what they are doing, as well as to dig deeper to find important weaknesses that can be exploited."

Coote, John.  What EBO Concepts and Capabilities Are Emerging from Your Experimentation?  London, UK, Ministry of Defence, 2004.  
24 slides.
Available online at:  http://www.act.nato.int/organization/transformation/cde04presentations/4novebobo/coote.ppt
Briefing presented at the 2004 Concept Development and Experimentation Conference, "Applied Transformation:  Driving Concepts to Capabilities," Calgary, Alberta, Canada, November 3-4, 2004.

Cordesman, Anthony H.  Understanding the New "Effects-Based" Air War in Iraq.  Washington, Center for Strategic and International Studies, March 15, 2003.  9 p.
Available online at:  www.csis.org/media/csis/pubs/iraq_airwar[1].pdf
"The US and Britain will fight a new kind of air war in Iraq. It will be designed to paralyze enemy forces, rather than destroy them.  It will seek to bypass or avoid all targets that are not time-sensitive military assets to a regime that will be gone in days or weeks. ...  There are, however, limits to what the US and Britain can do, and the bombing campaign involves a wide range of complex new issues.  The following ten points may help explain what is happening and how to evaluate it."

Crowder, Gary L.  Effects Based Operations Briefing.  DoD News Transcripts, 27 p, March 19, 2003.
Available online at:  http://www.defenselink.mil/transcripts/2003/t03202003_t0319effects.html
Individual briefing slides are at:  http://www.defenselink.mil/news/Mar2003/g030318-D-9085.html
Briefing slides as a single file can be downloaded at:  http://www.defenselink.mil/news/Mar2003/030318-D-9085-024.pdf
A briefing on the concept of effects based operations presented by the Plans Director for Strategy Concepts and Doctrine at Air Combat Command.

Das, Balaram.  Effects-Based Operations:  Simulations with Cellular Automata.  Edinburgh, South Australia, Australia, Information Sciences Laboratory, Defence Science and Technology Organisation, June 2004.  44 p.  (DSTO-RR-0275).
Available online at:  http://handle.dtic.mil/100.2/ada426131
Also available online at:  http://www.dsto.defence.gov.au/publications/2677/DSTO-RR-0275.pdf
Although a number of interesting doctrines and a variety of novel strategies for effects-based planning and operations have been put forward, what has been missing is a sound framework to conduct experiments, to put these strategies to test.  A framework to formulate these strategies systematically and conduct ‘what if’ experiments is needed.  The main contribution of this report lies in establishing that cellular automata can provide the tools needed for such experimentation.

DeGregorio, Edward A. and others.  Integrating Effects-Based and Attrition-Based Modeling.  Middletown, RI, Rite-Solutions, Inc., 2004.  20 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/152.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/152.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.

Denhard, Dave and Umstead, Robert.  Using Hierarchical Modeling to Assist Effects Based Planning and Assessment.  Wright-Patterson AFB, OH, Air Force Institute of Technology, 2005.  17 p.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/Denhard.pdf
Individual briefing slides are at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/Denhard.ppt).
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Denny, David Anthony and Deptula, David A.  Air Force Operations Concept Aims at Success, Not Destruction, March 20, 2003.  March 21, 2003.  7 p.
Available online at:  http://www.usembassy.it/file2003_03/alia/A3032114.htm
In an interview with Washington File staff writer David Anthony Denny on March 7 at his office in Langley Air Force Base, General Deptula sought to give an overview of what constitutes effects-based operations, and then provided specific examples from his experiences in the Gulf War and while commanding the patrolling of northern Iraq in support of U.N. Security Council sanctions during 1998 and 1999.

Deptula, David A.  Effects-Based Operations:  A U.S. Commander's Perspective.  Pointer 31, no.2:13-20 2005.
Available online at:  http://www.mindef.gov.sg/imindef/publications/pointer/journals/2005/v31n2/features/feature2.html
The article provides interesting insights into the application of EBO during the U.S. air campaign in Operation Desert Storm.  LtGen Deptula gives an account on how the air operations were carried out on a combination of stealth and precision with effects-based targeting.

Deptula, David A.  Effects-Based Operations:  Change in the Nature of Warfare.  April 23, 2001.
Available online at:  http://www.connectlive.com/events/afa/
Webcast originally broadcast on April 23, 2001 at the Eaker Breakfast Series sponsored by the Air Force Association and the Aerospace Education Foundation for the release of the print publication of the same title (See in Documents section).

Dubin, Hank.  Directed Energy Technologies:  Tools to Enable Effects-Based Operations.  S.l., s.n., 2005.  12 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/dubin.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Duczynski, Guy.  Effects-Based Operations:  A Guide for Practitioners.  Canberra, ACT, Australia, Jacobs Sverdrup Australia, 2004.  26 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/198.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentation/198.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.  It was also presented at the 9th International Command and Control Research and Technology Symposium, Copenhagen, Denmark.

Durkac, Louis M.   Effects-Based Operation Planning:  "Convergent" Course of Action (COA) Development.  Norfolk, VA, Joint Forces Staff College, 2006.  4 p.  (Student paper).
Available online at:  http://www.dodccrp.org/events/2006_CCRTS/html/papers/229.pdf
Paper prepared for the 2006 Command and Control Research and Technology Symposiuim, "The State of the Art and the State of the Practice."

Effects Based Operations (EBO) in Urban Combat.  Defense Update:  International Online Defense Magazine  No.1:(2 p)  February 2006.  
Available online at:  http://www.defense-update.com/features/du-1-06/urban-c4i-4.htm

Effects Based Thinking--EBT.  Millington, TN, Human Resources Branch, Navy Installations Command, 2006.  13 slides.  
Available online at:  http://www.mwr.navy.mil/trainingresources/nuggets/effects_based_thinking.ppt#257,1,Effects Based Thinking - EBT

Evans, Alan and others.  Strategy Development for Effects-Based Planning.  Burlington, MA, ALPHATEC, Inc., 2002.  19 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/White_Strategy.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Fayette, Daniel F.  Effects-Based Operations:  Applications of New Concepts, Tactics, and Software Tools Support the Air Force Vision for Effects-Based Operations.  Rome, NY, Dynamic Command and Control Branch, Information Technology Division, Information Directorate, Air Force Research Laboratory, 2001.  5 p.
Available online at:  http://www.afrlhorizons.com/Briefs/June01/IF00015.html

Fitchett, Joseph.  News Analysis:  With New Technology, U.S. Tries Out New Way to Make War.  International Herald Tribune, March 24, 2003.
Available online at:  http://www.uni-muenster.de/PeaCon/global-texte/g-w/n/fitchett-newwar.htm

Fleet, Paul.  Effects-Based Operations:  An Evolutionary Concept Made Practical Only Recently.  North York, Ontario, Canada, Canadian Forces College, 2004.  26 p.  (Student paper).
Available online at:  http://wps.cfc.dnd.ca/papers/csc/csc30/exnh/fleet.pdf

Foghelin, Jan.  RMA, NCW, EBO, Transformation ... "One Damned Thing after Another, What Is Next?"  Stockholm, Sweden, Swedish Defence Research Agency (FOI), 2005.  11 p.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/janfoghelin.doc
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Fowler, Martin and Dobson, Mike.  OA for Effects-Based Operations in the Maritime Domain.  Portsdown, UK, Maritime Warfare Centre, 2005.  31 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/fowler.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Gallagher, Mark A. and others.  Input-Output Modeling for Effects Based Operations.  2002.  14 p.  (Draft).
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Gallagher_Snodgrass_Ehlers.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.
This paper won the Military Operations Research Society's Rist Prize for 2003.
We discuss the concept of Effects-Based Operations (EBO) and its inherent requirement for analytical modeling to assess the effects of potential actions.  We propose that the input-output model may be used to assess the direct and indirect impact of military operations in an enemy country.  We present the input-output model and demonstrate how it can be used to assess the impacts of a variety of military strategies against a region or nation.

Gleeson, Dennis J. and others.  New Perspectives on Effects-Based Operations:  Annotated Briefing.  Alexandria, VA, Joint Advanced Warfighting Program, Institute for Defense Analyses, June 2001.  51 p.  (IDA document, D-2583).
Available online at:  http://handle.dtic.mil/100.2/ada395129
This annotated briefing represents the JAWP thinking on metrics for effects-based operations to date, focusing on effects-based operations and the military instrument of national power (in the form of a joint force).  The team addressed four basic questions:  What are effects-based operations?  Why are they so difficult?  Why are they worth doing?  What comes next?

Glenn, Kevin B.  The Challenge of Assessing Effects-Based Operations in Air Warfare.  Air & Space Power Chronicles, (7 p), April 2002.
Available online at:  http://www.airpower.maxwell.af.mil/airchronicles/bookrev/glenn.html

Goodwin, Brent L. and Lee, Laura.  Planning and Assessing Effects Based Operations (EBO). Hampton, VA, SPARTA, Inc., 2005.  15 p.
Available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/128.pdf
Briefing slides at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/presentations/128.pdf
Paper presented at the 10th International Command and Control Research and Technology Symposium, "The Future of Command and Control," June 13-16, 2005, McLean, VA.

Graham, J. D. and Smith-Windsor, B. A.  Effects Based Approach to Coalition Operations:  A Canadian Perspective.  Ottawa, Ontario, Canada, National Defence Headquarters, 2004.  21 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/165.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/165.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.
"This paper explores the evolving Canadian response to the imperative of an integrated approach to security and defence from the perspective of the Canadian Forces.  It focuses on an emerging vision of an Effects Based Approach to security and defence supported by Enhanced Interoperability, which, if implemented, will likely enhance any future Canadian contributions to a coalition."

Great Britain.  Ministry of Defence.  Delivering Security in a Changing World:  Defence White Paper.  Norwich, UK, Stationery Office, 2003.  21 p.  (CMD 6041-1).
Available online at:  http://www.mod.uk/NR/rdonlyres/051AF365-0A97-4550-99C0-4D87D7C95DED/0/cm6041I_whitepaper2003.pdf

Great Britain.  Ministry of Defence.  The UK Military Effects-Based Approach.  Swindon, Wiltshire, UK, Joint Doctrine & Concepts Centre, Ministry of Defence, 2005.  14 p.  (Joint doctrine note, 1/05).
Available online at:  www.da.mod.uk/JSCSC/Courses/ESDC/Pre Reading Articles/JDN 1-05 UK Mil Effects Based Approach.pdf

Great Britain.  Parliament.  House of Commons.  Defence Committee.  Defence White Paper 2003:  Government Response to the Committee's Fifth Report of Session 2003-04.  London, Defence Committee, House of Commons, 2004.  20 p.  (HC 1048).
Available online at:  www.publications.parliament.uk/pa/cm200304/cmselect/cmdfence/1048/1048.pdf
Second special report of session 2003-04.

Great Britain.  Parliament.  House of Commons.  Defence Committee.  Defense White Paper 2003; Fifth Report of Session 2003-04, Volume I.  London, Defence Committee, House of Commons, 2004.  70 p.  (HC 465-1).
Available online at:  www.publications.parliament.uk/pa/cm200304/cmselect/cmdfence/465/465.pdf
"The 2003 Defence White Paper, Delivering Security in a Changing World, flows directly from the 1998 Strategic Defence Review and the 2002 New Chapter to the Strategic Defence Review.  At its centre are the concepts of effects-based operations and network-enabled capability.  It signals a shift of focus from platforms and numbers towards effects sought.  It proposes a re-balancing of land forces from heavy-weight towards medium-weight.  But it lacks essential details.  We are disappointed that an important policy document has been presented with little or no information on the relevant procurement decisions, funding questions or likely changes in force structures."

Grossman-Vermaas, Rob.  'Oh What a Tangled Web':  EBO in Theory and Practice.  Ottawa, Canada, Centre for Operational Research and Analysis, DDA/CFEC, 2005.  34 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/RGV.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 30, 2005.

Grossman-Vermaas, Robert.  Discourse of Action:  Command, Control, Conflict and the Effects Based Approach.  Ottawa, ON, Canada, Directorate of Defence Analysis, National Defense Headquarters, 2004.  28 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/015.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/015.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.

Grossman-Vermaas, Robert.  The Effects-Based Concept, MNE 3 and NMOs:  An Experimental Analysis.  Ottawa, Ont., Canada, Operational Research Division, National Defence Headquarters, 2004.  28 p.
Available online at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/papers/172.pdf
Paper also presented at the 9th International Command and Control Research and Technology Symposium, "Coalition Transformation:  An Evolution of People, Processes, and Technology to Enhance Interoperability," Copenhagen, Denmark, September 14-17, 2004.

Guitouni, A. and Wheaton, K.  Military Decision-Making Process and Effect-Based Operations Concepts:  A Comparative Study, Lessons Learned and Implications.  Val-Belair, Quebec, Canada, Defence Research and Development Canada -Valcartier, 2005.  42 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/guitouni.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Harris, John T.  Effects-Based Operations:  Tactical Utility.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, 2004.  90 p.
Available online at:  http://handle.dtic.mil/100.2/ada428961
Thesis, M.M.A.S., 2004.
Thesis research compares the effects-based approach to operations against the current objectives-based approach to operations and suggests that effects-based operations have tactical utility to the US Army.

Hayes, Richard and Iwanski, Sue.  Analyzing Effects Based Operations (EBO) Workshop Summary.  Phalanx  35:1+  March 2002.
Available online at:  http://www.mors.org/publications/phalanx/mar02/lead.htm
This article summarizes the purpose, findings and recommendations of the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.  A detailed report of the workshop is included in this bibliography under Military Operations Research Society (this section).

Henningsen, Jacqueline.  A Dialogue on Analyzing Effects Based Operations (EBO)  Phalanx  35:(8 p) March 2002.
Available online at:  http://www.mors.org/publications/reports/2002-Analyzing_Effects_Based_Operations.pdf  (see appendix C-1 (p 159)).

Ho, Joshua.  The Advent of a New Way of War:  Theory and Practice of Effects Based Operations.  Singapore, Institute of Defence and Strategic Studies, December 2003.  26 p.  (IDSS working paper series, no. 57).
Available online at:  http://www.idss.edu.sg/publications/WorkingPapers/WP57.PDF

Ho, Joshua.  Effects-Based Operations Equals to "Shock And Awe"?  Pointer  30, no.2:(5 p) 2004.
Available online at:  http://www.mindef.gov.sg/imindef/publications/pointer/journals/2004/v30n2/features/feature7.html

Ho, Joshua.  Effects-Based Operations:  The Dimensions of Effects-Based Operations:  A View from Singapore.  Australian Army Journal  2:99-106  Winter 2004.
Available online at:  http://www.defence.gov.au/army/lwsc/AbstractsOnline/AAJournal/2004_W/AAJ_Winter_2004_08.pdf

Hutchins, Susan G. and others.  Knowledge Management and Collaboration in an Effects-Based Operations Environment.  Monterey, CA, Graduate School of Operations and Information Science, Naval Postgraduate School, May 1, 2002.  15 p.
Available online at:  http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/110.PDF
Paper presented at the 7th Command and Control Research and Technology Symposium, Naval Postgraduate School, Monterey, CA, June 11-13, 2002.

IWS - The Information Warfare Site.  2005.
Available online at:  http://www.iwar.org.uk/rma/
The Information Warfare Site is an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce.  This link is to the Revolution in Military Affairs & C4I category.

James, Ron and Daniels, Troy.  Effects Based Operations (EDO) Endstate.  Burlington, MA, BAE Systems, 2005.  97 p.
Available online at:  http://handle.dtic.mil/100.2/ada436191

Jeffery, Kira and Herslow, Robert.  Effects-Driven, Capabilities-Based Planning for Operations.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/kirajeffery.doc
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Jones, Philip.  Development of UK EBO Analysis:  The Big Picture.  Porton Down, Salisbury, Wiltshire, UK, Dstl Policy and Capabilities Studies, 2005.  26 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/Jones.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Kaplan, Brad and Fields, Dave.  Operational Net Assessment, Centers of Gravity, and Lines of Operation:  Merging Existing and Emerging Doctrine.  Campaigning  No.1:21-26  Winter 2006.  
Available online at:  http://www.jfsc.ndu.edu/schools_programs/jaws/Publications/Campaigning_Journal_1-Jan-2006.pdf

Kemple, William G. and others.  Effects-Based Planning:  An Empirical Examination of the Process.  Monterey, CA, Graduate School of Operations and Information Sciences, Naval Postgraduate School, May 2002.  16 p.
Available online at:  http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/111.PDF
Paper presented at the 7th Command and Control Research and Technology Symposium, Naval Postgraduate School, Monterey, CA, June 11-13, 2002.
Focusing on effects, rather than attrition, enables a highly coordinated level of inter-service, interagency, and international cooperation.  An experiment was conducted to examine aspects of EBO, and to specifically assess and refine the effects-based planning process.  This paper describes the results of a survey on the effects-based planning and assessment process, and is a companion paper to two other papers that discuss results of the other two surveys that were administered.

Kessler, Graham.  Effects-Based Operations.  Norfolk, VA, Joint Experimentation, United States Joint Forces Command, 2002.  17 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Kessler.pdf
33 slide briefing presented at the Military Operations Research Society's Workshop on Analyzing Effects-Based Operations, McLean, Virginia, January 29-31, 2002.

Kolding, Jim.  A Tradesman's View of EBC/EBO.  S.l., Boeing Co., 2005.  13 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/kolding.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Lee, David B. and Kupersmith, Douglas.  Effects Based Operations:  Objectives to Metrics Methodology--An Example.  S.l., Emergent Information Technologies, Inc., 2002.  17 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/LeeKupersmith.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," Vienna, VA, January 29-31, 2002.

Leedom, Dennis K. and Eggleston, Robert G.  The Simulation of Sensemaking and Knowledge Management within a Joint Effects-Based Planning System.  Vienna, VA, Evidence Based Research, Inc., 2005.  20 p.  
Available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/040.pdf
Paper presented at the 10th International Command and Control Research and Technology Symposium, "The Future of Command and Control,"  June 13-16, 2005, McLean, VA.
This paper describes key aspects of research funded by the US Air Force Research Laboratory to develop a working simulation model of an effects-based targeting process as it might be reflected in a future coalition task force headquarters and subordinate component command headquarters.

Lindberg, J.  Effects Based Operations.  Fighter Tactics Academy, September 18, 2004.
Available online at:  http://www.sci.fi/~fta/EBO.htm
Links to various sites, government and otherwise, providing information on EBO.

Ling, Michael F.  Nonlocality, Nonlinearity and Complexity:  On the Mathematics of Modelling NCW and EBO.  Victoria, Australia, Defence Systems Analysis Division, Defence Science and Technology Organisation, 2005.  10 p.  
Available online at:  http://www.dsto.defence.gov.au/attachments/22ISMOR_Ling_Paper.pdf
Briefing slides available at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/Ling.ppt
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Lowe, Donald and Ng, Simon.  Effects-Based Operations:  Language Meaning and the Effects-Based Approach.  Canberra, ACT, Australia, Defense Science and Technology Organisation, Dept. of Defense, 2004.  9 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/207.pdf
Briefing slides available at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/207.pdf
Paper presented at the 2004 Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies."

McCrabb, Maris.  Effects-Based Coalition Operations:  Belief, Framing and Mechanism.  Yorktown, VA, DMM Ventures, 2002.  13 p.
Available online at:  http://www.aiai.ed.ac.uk/project/coalition/ksco/ksco-2002/pdf-parts/S-ksco-2002-paper-02-mccrabb.pdf
Paper presented at KSCO 2002, the 2nd International Conference on Knowledge Systems for Coalition Operations, Toulouse, France, April 23-24, 2002.  A 12-slide PowerPoint presentation is also available at:  http://www.aiai.ed.ac.uk/project/ksco/ksco-2002/presentations/mccrabb-ksco-2002.ppt.

McCrabb, Maris.  Effects-Based Operations:  An Overview.  52 slides.
Available online at:  http://www.dtic.mil/jointvision/ideas_concepts/ebo.ppt

McCrabb, Maris.  Explaining "Effects":  A Theory for an Effects-Based Approach to Planning, Executing and Assessing Operations.  Ver. 2.0.  August 7, 2001.  46 p.
Available online at:  http://www.dtic.mil/jointvision/ideas_concepts/ebo.doc

McCrabb, Maris.  Incorporating Effects-Based Operations into Military Operations.  Yorktown, VA, DMM Ventures, Inc., June 2005.  70 p.
Available online at:  http://handle.dtic.mil/100.2/ada436184

McCrabb, Maris and Caroli, Joseph A.  Behavioral Modeling and Wargaming for Effects-Based Operations.  Yorktown, VA, DMM Ventures, Inc., 2002.  20 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/McCrabb_Caroli.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

McGinnis, Mike and Lynch, Rick.  Operation Stavanger:  Standing Up a Deployable Joint Headquarters for the NATO Response Force.  West Point, NY, Operations Research Center of Excellence, United States Military Academy, 2004.  36 p.  (Technical report, DSE-TR-04-30).
Effects Based Operations, pp 7-14.
Available online at:  http://handle.dtic.mil/100.2/ada424168

McLamb, Wilburn B.  Reducing Uncertainty in Effects-Based Operations.  Wright-Patterson AFB, OH, Air Force Institute of Technology, Air University, 2006.  97 p.  
Available online at:  http://handle.dtic.mil/100.2/ada446177
Thesis (M.S.)--Air Force Institute of Technology, 2006.

Military Operations Research Society.  Analyzing Effects Based Operations Workshop Report.  Alexandria, VA, Military Operations Research Society, January 2002.  1 vol.
Available online at:  http://www.mors.org/publications/reports/2002-Analyzing_Effects_Based_Operations.pdf
Also available online at:  http://handle.dtic.mil/100.2/ada414980
Detailed report of a workshop held in January 2002.  The four key issues the workshop was asked to address were:  1. What does the phrase "effects-based operations" mean?; 2. What analytic challenges does it present to the Operations Research (OR) community?; 3. What approaches and tools already exist that offer promise in meeting these challenges?; 4. What actions should the OR community recommend in order to ensure quality analyses in support of effects-based operations?

Miller, Charles E.  Target Taliban.  National Review Online, (2 p), October 31, 2001.
Available online at:  http://www.nationalreview.com/comment/comment-miller103101.shtml

Mullen, M. G.  Meeting the Challenge of a New Era.  Washington, U.S. Navy, 2005.  
Available online at:  https://www.cnet.navy.mil/2006CNOG.pdf
CNO guidance for 2006.

Multinational Experiment Kicks Off.  Pentagon Brief, (2 p), February 15, 2004.
Available online at:  http://proquest.umi.com/pqdweb?did=550307441&sid=-1&Fmt=7&clientId=417&RQT=309&VName=PQD

Murray, Williamson and Woods, Kevin.  Thoughts on Effects-Based Operations, Strategy, and the Conduct of War.  Alexandria, VA, Joint Advanced Warfighting Program, Institute for Defense Analyses, January 2004.  38 p.  (IDA paper, P-3869).
Available online at:  http://handle.dtic.mil/100.2/ada428069
Examines how policy makers and military leaders should use EBO to achieve strategic, operational, and psychological effects, rather than focusing operations solely on the technological or tactical problems involved in hitting targets.

Neill, Douglas A.  Effects-Based Operations:  Not Simple, but Necessary.  North York, Ontario, Canada, Canadian Forces College, October 2002.  32 p.
Available online at:  http://wps.cfc.dnd.ca/papers/amsc/amsc5/neill.pdf
This student paper proposes that the limitations inherent in current targeting doctrine can be overcome through an evolved concept of EBO.

Noedskov, K.  Systematizing Effect Based Air Operations.  Chronicles Online Journal, (10 p), May 24, 2000.
Available online at:  http://www.airpower.au.af.mil/airchronicles/cc/noedskov.html
"'The intention with this article is to start a discussion on how we can improve operational level doctrine utilizing an effect based planning process."

Onslow, George J. and Wrigley, Gerry M.  Effects Based Operations within the UK Joint Force Air Component Headquarters (UKJFACHO).  S.l., s.n., 2005.  18 p.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/georgeonslow.doc
Briefing slides available at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/onslow.ppt
This paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005, discusses the methods used by the UK JFACHQ to implement EBO and in particular Operations Effectiveness Analysis (OEA).

Parlier, Greg H.  Effects-Based Logistics Operations:  A Strategic Supply Chain Approach for the US Army.  Huntsville, AL, University of Alabama in Huntsville, 2005.  137 p.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/gregparlier.doc
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Piccerillo, Robert A. and Brunbaugh, David A.  Predictive Battlespace Awareness:  Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations.  Washington, Air and Space Operations, Intelligence, Surveillance, Reconnaissance Directorate, Headquarters, Air Force (AF/XOIR), 2004.  9 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/132.pdf
Briefing slides available at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/132.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.

Pioch, Nicholas J.  Continuous Strategy Development for Effects-Based Operations.  Rome, NY, Rome Research Site, Information Directorate, Air Force Research Laboratory, 2006.  192 p.  (Technical report, AFRL-IF-RS-TR-2006-29).
Available online at:  http://handle.dtic.mil/100.2/ada444918

Plotz, Gary A.  Effects Based Operations Wargaming Simulation (EBOWS).  Vienna, VA, L-3 Communications Analytics Corp., June 2005.  12 p.
Available online at:  http://handle.dtic.mil/100.2/ada435864

Plummer, William W. and Krieger, Clifford R.  JSIMS Civil Environment Model.  Sudbury, MA, USAF ESC/CXC (Paradigm Technologies, Inc.), 2002.  5 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/PlummerKrieger.pdf
Paper presented at the Military Operations Research Society 's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Pollicott, Sarah L., Ball, David P., and Ferguson, Nielsen.  Effects Based Analysis of Adversary Systems.  Farnborough, UK, Dstl Air Systems, Ministry of Defence, 2005.  17 p.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/sarahpollicott.doc
Briefing slides available at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/sarahpollicott.pps
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Porter, Graham and others.  Future Force Development Concepts.  Farnborough, Hampshire, UK, Defence Science and Technology Laboratory, 2004.  16 p.
Available online at:  http://www.dodccrp.org/events/2004_CCRTS/CD/papers/257.pdf
Briefing slides at:  http://www.dodccrp.org/events/2004_CCRTS/CD/presentations/257.pdf
Paper presented at the Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," San Diego, CA, June 15-17, 2004.

Potts, Jim.  The Effects-Based Approach and Effects-Based Operations.  Swindon, Wiltshire, UK, Joint Doctrine and Concepts Centre, 2005.  43 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/JPOTTS.ppt
Slide presentation given at the 22nd International Symposium on Military Operational Research, August 30, 2005.

Precision Engagement:  Effects-Based Engagement for All Types of Operations.  Tucson, AZ, Precision Engagement SBA, Missile Systems, Raytheon Co., 2006.  2 p.  
Available online at:  http://www.raytheon.com/missions/stellent/groups/public/documents/content/cms04_018568.pdf
2 page advertising brochure for Raytheon's concept of precision engagement.

Raugh, David L.  Defining Doctrine for Transitions; A Case Study in Post-MCO Security.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, April 2005.  51 p.  (Monograph).
Available online at:  http://handle.dtic.mil/100.2/ada436142

Richardson, Hugh.  MOE & EBO in HQ ARRC.  Monchengladbach, Germany, Operational Analysis Branch, HQ Allied Rapid Reaction Corps, NATO, 2004.  20 slides.  
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2004/arrc.ppt
Slide presentation given at the 21nd International Symposium on Military Operational Research, September 2004,

Robb, John.  Effects Based Operations.  June 12, 2005.  3 p.
Available online at:  http://globalguerrillas.typepad.com/globalguerrillas/2005/06/effects_based_o.html

Robb, John.  Massively Parallel Operations.  Global Guerrillas  June 21, 2005. 2 p.
Available online at:  http://globalguerrillas.typepad.com/globalguerrillas/2005/06/massively_paral.html

Roper, Daniel S.  A Dual-Edged Sword:  Operational Rick and "Efficience"-Based Operations (EBO).  Fort Leavenworth, KS, School of Advanced Military Studies, United States Army Command and General Staff College, 2004.  65 p.
Available online at:  http://handle.dtic.mil/100.2/ada429356

Runals, Stephen.  Effects Based Planning and Operations & Operational Net Assessment (ONA):  Information Briefing.  S.l., Standing Joint Force Headquarters, Joint Forces Command, July 2004.  32 slides.  
Available online at:  https://ca.dtic.mil/doctrine/july04_sjfhq_onaeffects_info.ppt
Briefing presented at the Joint Faculty Education Conference, July 20, 2004.

Russell, James A.  Strategy, Security, and War in Iraq:  The United States and the Gulf in the 21st Century.  Cambridge Review of International Affairs 18:283-301  July 2005.  
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=17575623

Santicola, Henry J.  Centralized Control/Decentralized Execution:  A Valid Tenet of Airpower.  Carlisle Barracks, PA, U.S. Army War College, March 18, 2005.  26 p.  (USAWC strategy research project).
Available online at:  http://handle.dtic.mil/100.2/ada434411
"The tenets of centralized control and decentralized execution have recently come under fire due to emerging transformational concepts such as Network Centric Warfare (NCW) and Effects Based Operations (EBO)....  Even in the face of emerging joint operations concepts, centralized control and decentralized execution remains a valid tenet for the organization and employment of airpower."

Saunders-Newton, Desmond and Frank, Aaron B.  Effects-Based Operations:  Building the Analytic Tools.  Defense Horizons  No.19:1-8  October 2002.
Available online at:  http://www.ndu.edu/inss/DefHor/DH19/DH_19.htm
Also available online at:  http://handle.dtic.mil/100.2/ada422463
"The EBO concept has the potential to transform military planning and operations by establishing linkages between actions and intended effects.  The lynchpin of this capability will not be the development of weapon systems but the ability to analyze political and military situations so that force can be used in the most effective fashion to achieve desired effects."

Scully, Megan.  Air Force Official Concerned about Weapon Systems Costs. CongressDaily, pp 7-8, April 28, 2005.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&an=16912768

Senglaub, Michael.  The Analytic & Philosophical Imperatives of Effects-Based Operations (EBO).  Albuquerque, NM, Sandia National Laboratories, 2002.  13 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Senglab.pdf
Paper presented at the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Smith, Ed.  Effects-Based Operations ... The Way Ahead.  23 slides.
Available online at:  http://www.dtic.mil/jointvision/ideas_concepts/smith_ebo.ppt

Smith, Edward A.  Complexity, Networking, & Effects-Based Approaches to Operations.  Washington, CCRP Publications, 2006.  333 p.
Available online at:  http://www.dodccrp.org/files/Smith_Complexity.pdf

Smith, Edward A., Jr.  Complexity, Networking, and Effects-Based Operations:  Approaching the "How to" of EBO.  Arlington, VA, Boeing Co., 2005.  21 p.
Available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/252.pdf
Also available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/presentations/252.pdf
Paper presented at the 10th International Command and Control Research and Technology Symposium, "The Future of Command and Control," June 13-16, 2005, McLean, VA.

Smith, Edward A., Jr.  Effects-Based Operations:  The "How To."  Arlington, VA, Boeing Co., 2005.  26 p.
Available online at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/edsmith.doc
Briefing slides available at:  http://www.dcmt.cranfield.ac.uk/ismor/ISMOR/2005/ESmith.ppt
Paper presented at 22nd International Symposium on Military Operational Research, August 29-September 2, 2005.

Smith, Edward A., Jr. Effects-Based Operations:  The Way Ahead. S.l., Boeing Co., 2004. 25 p.
Available online at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/papers/095.pdf
Briefing slides at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/presentations/8/095.pdf
Paper presented to the 9th International Command and Control Research and Technology Symposium, Copenhagen, Denmark, September 14-16, 2004.

Smith, Edward A., Jr.  From Effects-Based Operations to Effects-Based Deterrence:  Military Planning and Concept Development.  26 p.
Available online at:  http://www.ndu.edu/inss/books/Books_2002/Globalization_and_Maritime_Power_Dec_02/17_ch16.htm
Chapter 16 in book, Globalization and Maritime Power, edited by Sam J. Tangredi. 2002.

Smith, Edward A., Jr.  Whither EBO?:  Prospects for a Network Enabled Synergy.  Arlington, VA, Boeing Co., 2006.  21 p.
Available online at:  http://www.dodccrp.org/events/2006_CCRTS/html/papers/217.pdf
Paper prepared for the 2006 Command and Control Research and Technology Symposium, "The State of the Art and the State of the Practice."

Snyder, Daniel and Tolk, Andreas.  Exchanging PMESII Data to Support the Effects-Based Approach.  Suffolk, VA, Booz Allen Hamilton, 2006.  22 p.
Available online at:  http://www.dodccrp.org/events/2006_CCRTS/html/papers/081.pdf
Paper prepared for the 2006 Command and Control Research and Technology Symposium, "The State of the Art and the State of the Practice."

Starkey, Julilan.  Defense Planning and Effects-Based Operations:  Effects Based Operations or Assessment, Tools and Metrics.  Swindon, UK, Joint Doctrine and Concepts Centre, Ministry of Defence, 2005.  9 p.
Available online at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/106.pdf
Briefing slides at:  http://www.dodccrp.org/events/10th_ICCRTS/CD/presentations/106.pdf
Paper presented at the 10th International Command and Control Research and Technology Symposium, "The Future of Command and Control," June 13-16, 2005, McLean, VA.

Summary of the MORS Workshop "Analyzing Effects-Based Operations," January 29-31, 2002, Booz Allen Hamilton, McLean, Virginia.  8 slides.
Available online at:  http://www.mors.org/meetings/oa_nco/nco_pres/Iwanski.pdf

Taylor, Claire.  The Defence White Paper.  London, International Affairs and Defence Section, House of Common Library, 2004.  38 p.  (Research paper, 04/71).
Available online at:  www.parliament.uk/commons/lib/research/rp2004/rp04-071.pdf
This paper outlines the main elements of the 2003 Defence White Paper (this section) and examines some initial comments.

Thomas, Troy S. and Casebeer, William D.  Turbulent Arena:  Global Effects Against Non-State Adversaries.  US Air Force Academy, CO, Institute for National Security Studies, June 2005.  64 p.  (INSS occasional paper, 58).
Available online at:  http://handle.dtic.mil/100.2/ada435411

Thompson, Rick.  Effects-Based Operations:  A Construct for Canada.  North York, Ontario, Canada, Canadian Forces College, 2004.  64 p.
Available online at:  http://wps.cfc.dnd.ca/papers/csc/csc30/mds/thompson.pdf
This student paper examines the implications for Canada of Effects-Based Operations (EBO).  It proposes that that Canada needs to make organizational and procedural adjustments to adapt to EBO.

Thuve, Håkon.  A State-Space Formulation for Effects-Based Operations.  The Hague, Netherlands, NATO C3 Agency, 2006.  14 p.  
Available online at:  http://www.dodccrp.org/events/2006_CCRTS/html/papers/007.pdf
Paper prepared for the 2006 Command and Control Research and Technology Symposium, "The State of the Art and the State of the Practice."

Tighe, Thomas and others.  A Decision for Strategic Effects:  A Conceptual Approach to Effects Based Targeting.  Chronicles Online Journal, (20 p), October 11, 2000.
Available online at:  http://www.airpower.au.af.mil/airchronicles/cc/Hill.html
"This article proposes a framework that may be useful in analyzing an enemy and identifying opportunities for strategic attack.  This approach is broad enough to capture doctrine, simple enough to apply in practice, and structured enough to attempt to model mathematically.  The framework is a logical extension of Boyd's Observe-Orient-Decide-Act (OODA) loop decision cycle theory.  The OODA loop was developed to describe a tactical situation and has been extrapolated to explain overarching command and control systems.  The proposed approach uses the OODA to describe war as a chain of discrete, but dependent and irreversible decisions that take place throughout the enemy system.  Impacting the processes that make these decisions becomes the focus for creating the desired effects."

Tomme, Edward B.  The Paradigm Shift to Effects-Based Space:  Near-Space as a Combat Space Effects Enabler.  Maxwell AFB, AL, Airpower Research Institute, College of Aerospace Doctrine, Research and Education, Air University, 2005.  70 p.  (Research paper, 2005-01).
Available online at:  http://www.au.af.mil/au/awc/awcgate/cadre/ari_2005-01.pdf

Triscari, Thomas and Wales, William J.  Supporting Effects-Based Operations (EBO) with Information Technology Tools:  Examining Underlying Assumptions of EBO Tool Development Practices.  Troy, NY, Rensselaer Polytechnic Institute, May 2005.  15 p.  (AFRL-IF-RS-TR-2005-179).
Available online at:  http://handle.dtic.mil/100.2/ada435007

Tu, Haiying and others.  Robust Action Strategies to Induce Desired Effects.  Storrs, CT, Dept. of Electrical and Computer Engineering, University of Connecticut, 2002.  22 p.
Available online at:  http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/109.PDF
Student paper presented at the 2002 Command and Control Research and Technology Symposium, Monterey, CA, 2002.

Turner, Paddy.  Findings from the First UK-Led Effects-Based Planning Experiment.  Malvern, Worcestershire, UK, QinetiQ plc, 2004.  12 p.
Available online at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/papers/124.pdf
Paper presented to the 9th International Command and Control Research and Technology Symposium, "The Power of Information Age Conceptss and Technologies", Copenhagen, Denmark, September 14-16, 2004.  This paper outlines the findings from the first UK Effects Based Planning Experiment, conducted in October 2003.  The main aim of the experiment was to assess a candidate EBP process at the operational level of command and identify equipment capability requirements and issues for short- to medium-term exploitation.

Turner, Paddy and others.  Effects Based Planning:  A UK Research Perspective.  Malvern, Worcestershire, UK, QinetiQ plc, 2004.  9 p.
Available online at:  http://www.dodccrp.org/events/9th_ICCRTS/CD/papers/123.pdf
Paper presented to the 9th International Command and Control Research and Technology Symposium, "The Power of Information Age Concepts and Technologies," Copenhagen, Denmark, September 14-16, 2004.

Umstead, Robert K.  Effects-Based Decision Making in the War on Terror.  Wright-Patterson AFB, OH, Air Force Institute of Technology, Air University, June 2005.  62 p.  (Graduate research project).
Available online at:  http://handle.dtic.mil/100.2/ada435165
"This project investigates two such techniques; network flows and risk analysis to identify nodes of influence (centers of gravity) and courses of action (sets of actions).  Applications of these techniques span the entire spectrum of military operations, but are particularly suited to the war on terrorism."

United States.  Air Force.  Air Combat Command.   Effects-Based Operations.  Langley AFB, VA, ACC/XP, May 2002.  26 p.  (ACC white paper).
Available online at:  https://wwwmil.acc.af.mil/xp/xps/Web%20Page%20Items/EBO%20Items/ACC%20EBO%20WHITE%20PAPER%20SIGNED2.pdf

United States.  Air Force.  Air Force Doctrine Center.  Effects.  Maxwell AFB, AL, February 16, 2001.  2 p.  (Doctrine watch, #14).
Available online at:  https://www.doctrine.af.mil/afdcprivateweb/DoctrineWatch/DWArchive.pdf (p 27; restricted site)

United States.  Air Force.  Air Force Doctrine Center.  Effects-Based Operations (EBO).  Maxwell AFB, AL, November 30, 2000. 2 p.  (Doctrine watch, #13).
Available online at:  https://www.doctrine.af.mil/afdcprivateweb/DoctrineWatch/DWArchive.pdf (p 25; restricted site)
The adjective "effects-based" is now used in connection with many aspects of warfighting, but remains a doctrinally undefined term.  The new AFDD 2-1.2, Strategic Attack, states, "Effects-based means that military actions, such as operations, targeting or strategy, are designed to produce distinctive and desired results."

United States.  Defense Science Board.  DSB Summer Study on Special Operations and Joint Forces in Support of Countering Terrorism.  Washington, Defense Science Board, August 16, 2002.  30 slides.
Available online at:  http://www.serendipity.li/more/dsbbrief.ppt
Excerpt of the final outbrief.

United States.  Dept. of the Air Force.  Symposium Provides Forum to Explore Aerospace Power.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&an=32W20019200006429

United States.  Joint Forces Command.  Concept White Paper for Integrated Intelligence, Surveillance, & Reconnaissance (I2SR).  Version 1.5.  Norfolk, VA, United States Joint Forces Command, September 17, 2004.  66 p.
Available online at:  http://www.dtic.mil/doctrine/education/mecc1005_i2srconcept.doc

United States.  Joint Forces Command.  Joint Experimentation Directorate.  EBE Tiger Team.  The Multinational Effects-Based Operations Process:  Effects-Based Execution:  Concepts of Operations (CONOPS).  March 3, 2005.  16 p.  (Draft version 0.11).
Available online at:  http://www.act.nato.int/events/documents/mne4ws1docs/ebeconopsv011.pdf

Vane, Russ and others.  Urban Sunrise.  Rome, NY, Rome Research Site, Information Directorate, Air Force Research Laboratory, 2004.  177 p.  (Technical report, AFRL-IF-RS-TR-2004-22).
Available online at:  http://handle.dtic.mil/100.2/ada421528
This report describes the research performed to explore the potential to enhance military urban operations, planning and execution, by providing new civil intelligence preparation-analysis and Effects Based Operations (EBO) planning capabilities to the urban warfighters and occupying civil adminstrations.

Wagenhals, Lee W. and Levis, Alexander H.  Effects-Based Course of Action Analysis in Support of War Games.  Fairfax, VA, George Mason Univesity, 2002.  18 p.
Available online at:  http://www.mors.org/meetings/ebo/ebo_reads/Wagenhals_Levis.pdf
Paper presented to the Military Operations Research Society's "Workshop on Analyzing Effects-Based Operations," McLean, VA, January 29-31, 2002.

Wagenhals, Lee W. and Levis, Alexander H.  Modeling Support of Effects-Based Operations in War Games.  16 slides.
Available online at:  http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/093.pdf
Presented at 2002 Command and Control Research and Technology Symposium, Mont
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
INSCOM Employee Review
A whopping 2 star review
http://www.glassdoor.com/Reviews/Employee-Review-INSCOM-RVW1263652.htm

INSCOM – “Average- less than other services but some units within inscom are good”
1 of 1 people found this helpful

INSCOM Intelligence Analyst:   (Current Employee)

Pros

Army benefits- medical, dental, life
Job security

Cons

No balance of work/life
No sick family leave act

Advice to Senior Management

Ensure maturity in your leaders at all levels
-----------------------------------------------
As long as Americans keep making numerous references to the constitution there should be plenty of 'job security'. :)
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
INSCOM working with Euro fusion center
http://www.inscom.army.mil/MSC/Default66.aspx?text=off&size=12pt

What?  You thought they were only here in USA?
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins

NOTE: UN TYPE UNI's FLAG.

http://www.inscom.army.mil/msc/defaultngic.aspx?text=off&size=12pt

Mission: The National Ground Intelligence Center produces and disseminates all-source integrated intelligence on foreign ground forces and related military technologies to ensure that U.S. forces have a decisive edge in current and future military operations.

The National Ground Intelligence Center is the Defense Department’s primary producer of ground forces intelligence. NGIC produces scientific and technical intelligence and military capabilities analysis on foreign ground forces required by warfighting commanders, the force modernization and research and development communities, Defense Department and national policymakers.

NGIC’s general military intelligence mission focuses on foreign ground forces from the operational through small-unit level, maintaining detailed knowledge of current foreign ground force capabilities as well as a focus of five, 10 and 20 years in the future. It includes irregular and conventional warfare analysis examining foreign ground forces from a perspective that includes battlefield operating systems, doctrine, tactics, techniques and procedures, training, maintenance, logistics and order of battle.

NGIC also has highly-skilled specialists such as physicists, chemists, computer scientists, mathematicians and engineers in diverse fields from aeronautics to robotics - along with modelers, simulation experts, and other technical specialists who evaluate the capabilities and performance data on virtually every weapons system used by a foreign ground force, including chemical and biological weapons and future weapons concepts.
NGIC is the primary agency within the Defense Department responsible for the acquisition requirements management and exploitation of foreign ground systems materiel and helicopters.

NGIC’s Foreign Materiel Program gathers military intelligence characteristically found on recent battlefields or other places foreign materiel may be available. This extremely complex process involves factors such as materiel availability, prioritized customer requirements, funding and test site availability.

Visualization is critical to military intelligence, and NGIC is singularly capable of providing the pictures warfighters need. With experienced imagery analysts and scientists specializing in physics, chemistry and mechanical engineering, NGIC develops and produces a range of sophisticated Geospatial Intelligence products.

NGIC is leading the way in INSCOM’s counter improvised explosive device targeting program by providing technical intelligence and all source fusion capabilities to assist Multi-National Forces – Iraq in identifying bomb-making networks in Iraq.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Ever heard of Bridgeborn / Oberon / Stanley companies?

Bridgeborn Awarded Contract as part of Oberon, a Stanley Company, team to support ARMY Intelligence and Security Command (INSCOM)
http://bridgeborn.com/company/news7.asp

New business win further demonstrates the wide range of applications and markets for Bridgeworks© powered solutions

Virginia Beach, VA – August 26, 2008 – Bridgeborn, a leading systems design, engineering and integration company, today announced that the Oberon team, which includes Bridgeborn, was awarded a contract to support US ARMY Intelligence and Security Command (INSCOM) Futures Directorate. ARMY INSCOM conducts intelligence, security and information operations for military commanders and national decision makers.

“We are pleased to have been selected by Oberon, a Stanley Company, to be part of their team. INSCOM’s needs and their focus on transitioning research and development activities into ARMY Programs align with our core capabilities including research and development, systems design, engineering and integration as well as data visualization” said Kevin Curry, Bridgeborn co-founder and Chief Scientist. “This win further demonstrates the wide range of applications and markets for Bridgeworks© powered solutions. We look forward to working with Team Oberon and supporting ARMY INSCOM as we continue to grow our business in the Intelligence marketplace.”

About Bridgeborn

Bridgeborn is a systems design, engineering and integration company that delivers innovative IT Solutions to the Federal Government and Commercial markets. Clients include DHS, JFCOM, USAID, and US ARMY.

Bridgeborn is a privately held company headquartered in Virginia Beach, VA with offices in Arlington, VA, Annapolis, MD and Savannah, GA. For more information, go to www.bridgeborn.com or call us at 757.437.5000
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
United States Military Intelligence Support to Homeland Security
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA429706

Worth the read.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Biometrics Intel
CACI provides Integrated Security and Intelligence Solutions (ISIS) that cover the spectrum of Critical Infrastructure Protection (CIP)
http://www.caci.com/fcc/isis/cipss.shtml

We assist government and commercial clients in developing integrated solutions to close gaps among security, intelligence and law enforcement and that address complex threats to critical infrastructure security.

Why Us? Because of Our Unique Solution Offerings

Protecting our nation's critical systems, networks and assets is essential to maintaining our way of life. At CACI, we have assembled a proven, cross-discipline, industry recognized team to provide precise critical infrastructure protection solutions.

CACI's unique mix of strategic, technical and operational subject matter experts is known equally for thought leadership and effective operations planning, training and execution.

Our CIP offering includes an integrated strategic and technical solutions component. Our team combines academic expertise with distinct qualifications in Organizational Transformation and Defense Acquisition Workforce Improvement, Strategic Communications and the Biometrics arena.

To address infrastructure hardening, CACI provides a CIP validation and training applications arm. It is comprised of planning, operational and tactical technicians from the following areas of expertise

    DoD Special Missions Unit
    Army Special Operations
    Army Special Forces
    Navy SEALs
    Navy EOD
    FBI
    ATF
    Federal Air Marshals
    Other federal, state and local law enforcement entities

Our Personnel and Key Discriminators

Wexford Group logo

The Wexford Group, International – a CACI Company is a specialized consulting entity. With the largest core of former Special Mission Unit personnel in the industry, Wexford brings depth and technical expertise to related security operations. These include tactical and strategic assessments, planning and preparedness activities to strengthen infrastructure against surreptitious reconnaissance and surveillance, explosive attacks and other hazards and acts of terrorism.

The American Small Business Coalition / Biometrics / INSCOM
http://www.theasbc.org/blogpost/263034/The-Chief-Visionary-Blog?tag=inscom


Six3 Systems, Inc., of McLean, Virginia, protests the decision by the Department of the Army Intelligence and Security Command (INSCOM) to set aside for small business competition request for proposals (RFP) No. W911W4-11-R-0004, for identity intelligence (I2) biometrics services. In its initial protest, Six3 argued that a small business meeting the specified size standard of $7 million could not possibly have the personnel required to meet the solicitation's requirements; it was unlikely that a small business would be capable of successfully deploying qualified personnel immediately after award due to high demand for individuals with the required skill sets; small businesses were unlikely to have the infrastructure necessary to recruit, train, and manage the necessary personnel; and small businesses were not financially capable of performing.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
SPOOK UNIVERSITY
http://ni-u.edu/about%20niu/mission.html

How are your SAT scores?

NIU Strategic Vision and Mission


Strategic Vision

The NIU seeks to continue and expand its role as the nexus for collaboration, intelligence research, and intelligence education for the entire IC. Operating on the principles that education should be relevant, accessible and life-long, the NIU exists to support the Intelligence Community and national security processes through its continuously updated curriculum, intelligence-focused research, and motivated graduates.


Mission

Prepare intelligence professionals, both military and civilian through education and research, to work with skill and dedication in identifying and effectively integrating foreign, military, and domestic intelligence in defense of the homeland and of the U.S. interests abroad.

Place high priority on education and research to meet the combat and peacetime intelligence needs of the Department of Defense. Enhance the competence of intelligence professionals attending NIU through a variety of academic and educational programs, which include granting intelligence undergraduate and graduate degrees, and undertaking and disseminating intelligence research in the furtherance of those programs, and establishing and enforcing appropriate learning standards.

Act as the DoD primary point of contact for academic outreach regarding intelligence matters. Contribute to the educational and professional career development of military and Federal civilian personnel who are pursuing careers in intelligence, defense policy and programs, homeland defense, or homeland security.

Continue the expansion of degree-program offerings, international programs, research, and academic outreach to federal, public, and private colleges and universities.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
JOBS!!! JOBS!!! JOBS!!!!

INSCOM Cyber Brigade!!!
http://federalsoup.federaldaily.com/forum_posts.asp?TID=38389&title=inscom-cyber-brigade


Hello everyone,

I have recently been offered an Intelligence position for the Army's new INSCOM CYBER BRIGADE at Fort Meade. There is a decent amount of information about the position on their website and from the job boards, but no real specifics. I know they can't go too deep because of the sensitive information, but I wish I could know more about it before I decide to take the position.

Does anyone work or know of anyone who works for this group? If so, what is the department and the job like?

Any info would be greatly appreciated.
-----------------------------------------------
Well, that is one of the biggest issues with recruitment in the federal govt.  You just never ever know how the new employer or management will be until you work there.  Of course you can always contact current employees.  But everyone is different and everyone has different perspective of things.  What is the old saying.. opinions are like ***holes, everyone has one.
 
I've journeyed thru Treasury and DoD thru my many years and I can say that most places are nothing compared to what current folks descibed... except one thing...  if you hear that the management is corrupt, abusive...  RUN!  Because it is usually true.  However, one person may fair well than another.  Pretty much if you employ with bad management and you can win into the "good ole boy club"...  you may be fine.  How do you win into?  *wink* *wink*
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Targeting Tomorrow’s Terrorist Today (T4) Through Open Source Intelligence (OSInt)
http://www.orgsites.com/va/asis151/Targeting_Tomorrows_Terrorist_Today_Through_Open_Source_Intelligence_Handbook.pdf

FOR OFFICIAL USE ONLY
hint: SCROLL DOWN TO 'MUST HAVES' ;)

Open Source Intelligence (OSINT): What It Is and What It Isn’t

According to the NATO Open Source Intelligence Handbook, November 2001, there are four
distinct categories of open source information and intelligence.

1) Open Source Data (OSD). Data is the raw print, broadcast, oral debriefing, or other form of
information from a primary source. It can be a photograph, a tape recording, a commercial satellite image,
or a personal letter from an individual. A god example is a reporter embedded with forces in Afghanistan
or Iraq. He/she is taking pictures, talking to soldiers, recording conversations and firefights, and taking
notes with a pen or pencil. This is considered raw data until it goes through a conversion process to
create a coherent product.

2) Open Source Information (OSI). OSI is comprised of the raw data that can be put together,
generally by an editorial process that provides some filtering and validation as well as presentation
management. OSI is generic information that is usually widely disseminated. Newspapers, books,
broadcasts, and general daily reports are part of the OSI world. An example is a reporter embedded with
forces who takes the raw data and converts it into a meaningful article that is printed in newspapers,
magazines or broadcasted over the air waves. OSI is what a Soldier would purchase at the bookstore
inside the Post Exchange in the form of USA Today or Newsweek.

3) Open Source Intelligence (OSINT). OSINT is information that has been deliberately

discovered, discriminated, distilled, and disseminated to a select audience, generally the commander and
his/her immediate staff, in order to address a specific question. In the case of a battlefield commander, it
would more than likely be answering the priority intelligence requirements (PIR) or specific orders or
requests (SOR). OSINT, in other words, applies the proven process of intelligence to the broad diversity
of open sources of information, and creates intelligence. Example: The meaningful article above (OSI)
that was created from raw data is used to support an operation. It’s quite possible that a photo
accompanying the article may be of a house known to harbor insurgents. The photo in the article
identifies the location and now can be used to support a tailored operation to attack the insurgents.
4) Validated OSINT (OSINT-V). OSINT-V is information to which a very high degree of certainty
can be attributed. It can only be produced by an all-source intelligence professional, with access to
classified intelligence sources, whether working for a nation or for a coalition staff. It can also come from
an assured open source to which no question can be raised concerning its validity (live video of an
aircraft arriving at an airport that is broadcast over the media). OSINT-V is OSINT for which there are
either confirming or unavailable classified sources or there are no available classified sources disputing
OSINT. OSINT-V is produced only when the analyst has access to classified sources.

Example: CNN reporter takes photos and reports on a bridge. Intelligence personnel are aware
the bridge is vital for the movement of insurgent supplies; however, CNN is unaware of that. Classified
information confirms that such a bridge exists. This in effect validates the reporting as OSINT-V,
especially if the bridge is identified to be destroyed to keep insurgents from moving supplies. But, if there
isn’t anything in the classified holdings to deny the existence of the bridge, it is still considered OSINT-V
since this is the first time the bridge has been observed and reported, and there are other sources to
backup the findings.

People in the intelligence business are realists and know that everything cannot be monitored
simultaneously; construction of new infrastructure is continuously taking place around the world. We
cannot keep track of new buildings, bridges, roads or airfields being built. This is what makes open
source reporting extremely valuable. It covers the areas the classical “INTS” are not assigned to cover.
The only time OSINT-V can be disputed is when there is confirming evidence to deny the information.
Summary: How do I know when I have OSINT? The simple answer is the analyst does not have
OSINT until the open source information has been processed and analyzed, and supports a specific
requirement. The specific requirement can be a tailored operation or simply answering a question. The
analyst has to be very careful when it comes to distinguishing between OSI and OSINT. Open source
information exploitation is exactly what the name implies, that which is gathered/collected from open sources. In general, it is information that is available to the general public without restrictions unless it is
copyrighted material. These include newspapers, the internet, books, phone books, scientific journals,
radio broadcasts, television, individuals, and other forms. On the other hand, OSINT is an intelligence
gathering discipline that involves collecting information from open sources and analyzing it to produce
usable intelligence, and there isn’t anything that says intelligence must be classified in order for it to have
utility. In the Intelligence Community, the term "open" refers to overt, publicly available sources (as
opposed to covert or classified sources); it is not related to open-source software. OSINT is distinguished
from straight research in that it applies the process of intelligence to create tailored knowledge supportive
of a specific decision by a specific individual or group.

Mining The Internet For Intelligence

How much data is on the internet that can be used for open source intelligence purposes? We
are looking at approximately 5 million terabytes. Just how big is a terabyte? Let’s start with the basics
and work our way up.
Bit: A Bit is the smallest unit of data that a computer uses. It can be used to represent two states of
information, such as Yes - No or 0 - 1.
.
Byte: A Byte is equal to 8 Bits. 1 Byte could be equal to one character. 10 Bytes could be equal to a
word. 100 Bytes would equal an average sentence.
.
Kilobyte (KB) = approximately 1,000 bytes
A kilobyte (KB) is normally defined as 1,000 bytes. Technically, a kilobyte is actually 1,024 bytes which is
2 to the 10th power (1,024) bytes.
.
kilobit = approximately 1,000 bits
A kilobit is different than a Kilobyte. A kilobit is approximately 1000 bits while a Kilobyte is approximately
1000 bytes.
.
Megabyte (MB) = approximately 1,000 KB or 1,000,000 bytes
Technically a Megabyte is 2 to the 20th power
(1,048,576) bytes.
.
megabit = approximately 1,000 kilobits = 1,000,000 bits
.
In data communications, a kilobit is a thousand bits (or 1,000 bits) and a megabit is a thousand kilobits (or
1,000,000 bits). These are normally used for measuring the amount of data that is transferred in a
second between two telecommunication points. Kilobits per second is usually shortened to kbps and
megabit per second is abbreviated as mbps.
Bits in data communications are discrete signal pulses. For example, 28.8 kilobits per second (kbps) is
28,800 bits per second.
.
Gigabyte = approximately 1000 Megabytes = 1,000,000 Kilobytes = Billion bytes (1,000,000,000 bytes)
Technically a Gigabyte is 2 to the 30th power (1,073,741,824) bytes.
.
Terabyte (TB) = approximately 1,000 Gigabytes = 1,000,000 Megabytes = Trillion bytes
(1,000,000,000,000 bytes)
Technically a Terabyte is 2 to the 40th power (1,099,511,627,776) bytes
.
Petabyte (PB) = approximately 1,000 Terabytes = 1,000,000,000,000,000 bytes
Technically a Petabyte is 2 to the 50th power (1,125,899,906,842,624) bytes
.
Exabyte (EB) = approximately 1,000 Petabytes = 1,000,000,000,000,000,000 bytes
Technically an Exabyte is 2 to the 60th power (1,152,921,504,606,846,976) bytes
.
It is estimated that if you were to type up every word ever spoken by every human being ever to live in all
of the history of the world, the resulting file would be between 2 and 5 Exabytes in size.
.
Zettabyte = 1000 Exabytes
.
Yottabyte = 1000 Zettabytes

Brontobyte = 1000 Yottabytes = 1,000,000,000,000,000,000,000,000,000 bytes = 1 followed by 27
zeros…

How big is 1 followed by 27 zeros? That would be the rough equivalent of the total number of
atoms contained in all of the bodies of every person living in Indiana… give or take a few billion-trillion
here and there…

Source: Shelbyville Central Schools at http://www.shelbycs.org/technology/howbigisagigabyte.html
Based on these figures, I opine that intelligence exists out there just waiting to be tapped. Oh,
come on now, you do have search engines to help research that data; it’s only 5 million terabytes! Lots of
data but guess what, even Google, which is considered currently the best search engine, has only
indexed about 170 terabytes. Now you know why I recommend using more than one search engine.

Must Haves
NATO Open Source Intelligence Handbook
http://www.oss.net/dynamaster/file_archive/030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSIN
T%20Handbook%20v1.2%20%2d%20Jan%202002.pdf
NATO Open Source Intelligence Reader

http://www.oss.net/dynamaster/file_archive/030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSIN
T%20Reader%20FINAL%2011OCT02.pdf

Intelligence Exploitation Of The Internet
http://www.oss.net/dynamaster/file_archive/030201/1c0160cde7302e1c718edb08884ca7d7/Intelligence%
20Exploitation%20of%20the%20Internet%20FINAL%2018NOV02.pdf

INSCOM OSINT Operations Handbook http://nipr.intelink.gov/inscom/docs/inscom_hb_v1.pdf
https://www.intelink.gov/inscom/docs/inscom_hb_v1.pdf

Open Source Intelligence FM 2-22.9 http://www.fas.org/irp/doddir/army/fmi2-22-9.pdf

Untangling The WEB 2007 Edition http://nipr.intelink.gov/nsa/UTW/index.html
https://www.intelink.gov/nsa/UTW/index.html

Open Source Exploitation: A Guide For Intelligence Analysts
http://nipr.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf
https://www.intelink.gov/osis/training/osint_handbook_apr_04_edition.pdf

Internet Detective a free online tutorial designed to help students develop the critical thinking
required for their Internet research. The tutorial offers practical advice on evaluating the quality of
websites and highlights the need for care when selecting online information sources.
http://www.vts.intute.ac.uk/detective/

... AND ON ON IT GOES
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
John is da man!!!!!!!!!!!!!

awesome, keep it coming (I mean really, WTF is this shit and why isn't our supposed "NATIONAL SECURITY AGENCY" not immediately indicting this overtly obvious fleeting enemy to the United States?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
John is da man!!!!!!!!!!!!!

awesome, keep it coming (I mean really, WTF is this shit and why isn't our supposed "NATIONAL SECURITY AGENCY" not immediately indicting this overtly obvious fleeting enemy to the United States?

Make my last post a priority before they disable the link and knock on my door.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline Geolibertarian

  • Global Moderator
  • Member
  • *****
  • Posts: 13,144
  • 9/11 WAS AN INSIDE JOB! www.911truth.org
I mean really, WTF is this shit and why isn't our supposed "NATIONAL SECURITY AGENCY" not immediately indicting this overtly obvious fleeting enemy to the United States?

Probably because both work for the same globalist masters (whether they even realize it or not).
"Abolish all taxation save that upon land values." -- Henry George

"If our nation can issue a dollar bond, it can issue a dollar bill." -- Thomas Edison

http://schalkenbach.org
http://www.monetary.org
http://forum.prisonplanet.com/index.php?topic=203330.0

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Probably because both work for the same globalist masters (whether they even realize it or not).

Yup, just two parts of the same "CONTROL REVOLUTION" that the elites are currently implementing.
http://forum.prisonplanet.com/index.php?topic=229359.0
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Biometrics
DoD Biometrics
http://www.biometrics.org/bc2007/presentations/Thu_Sep_13/Session_I/13_Dee_DOD.pdf
Where Do We Biometrics Want To Go
http://ec.europa.eu/research/science-society/pdf/biometrics/16-max_snijder_en.pdf
Biometric Training http://biometricesc.mi.army.mil/training/default.aspx
Links to Biometric Technology Websites http://www.biometrics.org/links.htm
Biometrics 101 Tutorial
http://www.biometrics.dod.mil/ReferenceTutorials/Biometrics101/tabid/86/Default.aspx
Biometrics Glossary
http://www.biometrics.dod.mil/ReferenceTutorials/BiometricsGlossary/tabid/87/Default.aspx
Radio Frequency Identification (RFID) Journal http://www.rfidjournal.com/
----------------------------------------------

I guess they flunked out on this one

Banking & Finance
Banking & Financial Crimes

http://encyclopedia.thefreedictionary.com/banking+and+financial+crimes
Financial Crimes Enforcement Network http://www.fincen.gov/index.html
http://www.ncjrs.org/ondcppubs/publications/policy/99ndcsbudget/financial.html
Financial Scandals http://www.ex.ac.uk/~RDavies/arian/scandals/
Countering Financial Crime Risks in Information Security
http://www.fsa.gov.uk/pubs/other/fcrime_sector.pdf
Money Laundering and Financial Crimes http://www.state.gov/g/inl/rls/nrcrpt/2001/rpt/8487.htm
Money Laundering, Terrorism and Financial Institutions
http://www.civicresearchinstitute.com/moneylaundering/fedreg02.html
Money Laundering http://www.moneylaundering.com/links/
Transnational Threats http://www.csis.org/tnt/rc/finance.html
United States Secret Service http://www.secretservice.gov/financial_crimes.shtml
-----------------------------------------------------------------------------------------
BLOGS
Fresh brewed news plus stewing views http://www.memeorandum.com/
Global Politics, Economics & Ideas http://www.foreignpolicy.com/resources/bgn.php
http://www.foreignpolicy.com/resources/links.php
Infoshop http://www.infoshop.org/inews/index.php?topic=16
Rantburg http://rantburg.com/index.php
Strategic Analysis And OSINT (An informative blog on issues related to its title)
http://strategicanalysis.i-blog.gr/
Counterterrorism http://counterterrorismblog.org/
Technorati (scours the blogosphere) http://www.technorati.com/
Informed Comment http://www.juancole.com/
Excellent Blog on Iranian Naval Capabilities
http://www.freerepublic.com/focus/f-news/1790191/posts
Local Blogdigger http://local.blogdigger.com/index.html
Google Blog Search http://blogsearch.google.com/
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
China HELLO CHINESE SPOOKS!!! ;D
China's Nuclear Weapons Facilities http://eyeball-series.org/prc-nukes/prc-nukes.htm
This shows selected PRC nuclear weapons testing sites, research and manufacturing facilities,
missile defense sites, satellite launch facilities, weapons storage areas and a submarine base.
http://www.atomicarchive.com/Almanac/PRCFacilities.shtml
http://www.fas.org/nuke/guide/china/index.html
http://www.globalsecurity.org/wmd/world/china/nuke.htm
http://www.nti.org/db/china/wnwmdat.htm
http://www.cdi.org/issues/nukef&f/database/chnukes.html
http://www.nuclearfiles.org/menu/key-issues/nuclear-weapons/issues/facilities/chinese-nuclear-weaponsfacilities.
htm
Compare to US Nuclear Weapons Facilities: http://eyeball-series.org/nwsa/nwsa-eyeball.htm
http://eyeball-series.org/kumsc-eyeball/kumsc-eyeball.htm
http://eyeball-series.org/pantex-eyeball.htm
http://eyeball-series.org/daf-eyeball.htm
http://eyeball-series.org/lanl/lanl-eyeball.htm
http://eyeball-series.org/llnl/llnl-eyeball.htm
http://eyeball-series.org/ornl-eyeball.htm
http://eyeball-series.org/nellis-eyeball.htm
http://eyeball-series.org/cnws-eyeball.htm
http://eyeball-series.org/kings/kings-eyeball.htm
http://eyeball-series.org/bangor-eyeball.htm
Maps of China http://www.maps-of-china.com/index.shtml
The China Post News http://www.chinapost.com.tw/
Submarines
http://www.strategypage.com/fyeo/howtomakewar/databases/submarine_database/submarines.asp
China Brief http://www.jamestown.org/publications_view.php?publication_id=4
http://www.jamestown.org/publications_archives.php?publication_id=4
Chinese-Russian exercise with ships, tank, aircraft etc.
http://video.google.com/videoplay?docid=-8842216285861816122
http://video.google.com/videoplay?docid=1457349235872084447
Military Power of the People’s Republic of China
http://www.globalsecurity.org/military/library/report/2006/2006-prc-military-power.htm
Chinese Military Power http://www.comw.org/cmp/
Chinese Defence Today http://www.sinodefence.com/
China Leadership Monitor http://www.hoover.org/publications/clm
China Today (military weapons and equipment) http://www.chinatoday.com/arm/
Chinese Air/Land/Sea Strike Missiles http://www.softwar.net/c801.html
The New Chinese Air Force http://www.softwar.net/plaaf.htm
Chinese Missile Page http://www.softwar.net/dongfeng.html
People’s Daily Online (English version) http://english.peopledaily.com.cn/
http://english.people.com.cn/rss/China.xml
China Air & Naval Power http://china-pla.blogspot.com/
Sino Defence http://www.sinodefence.com/
China's J-10: An Imagery Analysis
http://intellibriefs.blogspot.com/2008/01/chinas-j-10-imagery-analysis.html
Hypothetical attack on U.S. outlined by China
http://www.airforcetimes.com/news/2008/01/airforce_china_strategy_080121/
The Chinese SAM Network http://geimint.blogspot.com/2008/01/chinese-sam-network.html
China’s Emerging Air-To-Air Missiles
http://www.strategycenter.net/research/pubID.181/pub_detail.asp
China’s Military Power Reports http://www.defenselink.mil/pubs/china.html
China’s Cyber-Militia
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948
China’s Navy Into The Wild Blue Yonder
http://www.economist.com/world/asia/displaystory.cfm?story_id=11496828
Chinese Nuclear Forces http://www.thebulletin.org/files/064003009.pdf
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Cryptome (controversial site but has good information)
Eyeball Series http://www.cryptome.org/
http://eyeball-series.org/
------------------------------------------------
A sweet college girl doctorate lady friend of mine got recruited into the CIA for this particular field.  I SAID DON'T DO IT!!! I never saw her again.

Cultural Intelligence
A Defence of Cultural Intelligence
http://www.knowledge-finder.com/psychology/defence-cultural-intelligence.html
Cultural Awareness http://wrc.lingnet.org/culmil.htm
A Guide to Working with People from Other Cultures
http://ctb.ku.edu/tools/en/sub_section_main_1170.htm
Cultural Intelligence
http://www.valuebasedmanagement.net/methods_earley_cultural_intelligence.html
Cultural Intelligence and Modern Management
http://www.1000ventures.com/ebooks/bec_ebooks_cimm.html
http://www.1000ventures.com/business_guide/crosscuttings/cultural_intelligence.html
http://www.bkpub.com/static/culturalintelligence.pdf
Avoiding a Napoleonic Ulcer: Bridging the Gap of Cultural Intelligence (Or, Have We Focused on
the Wrong Transformation?)
http://www.mcu.usmc.mil/mcwar/irp/Documents/CJCS%20Essay%20-%20Smith.pdf
Culture and Technologies of Control
http://slash.autonomedia.org/analysis/02/11/05/1432210.shtml
University of Military Intelligence http://128.196.21.240/cultural/default.asp
Religion and Beliefs http://www.earthstation9.com/index.html?aircraf6.htm
Cultural Studies http://www.mcia.osis.gov/culture.htm
Iraqi Culture Smart Card (printable version) http://cryptome.org/iraq-culture.htm
http://www.fas.org/irp/doddir/usmc/iraqsmart-0506.pdf
Small Wars Journal (material on cultural intelligence) http://www.smallwarsjournal.com/
Pew Global Attitudes Project (a series of worldwide public opinion surveys) http://pewglobal.org/
Multicultural
http://www.awesomelibrary.org/Classroom/Social_Studies/Multicultural/Multicultural.html
Muslim American Society http://www.masnet.org/
Field Support Modules http://fieldsupport.lingnet.org/afghanistan.html
Iraq/Afghanistan https://www.atsc.army.mil/crc/index.asp
Culture Link http://www.culturelink.org/
Middle Eastern Culture http://www.shira.net/culture.htm
http://www.albany.edu/history/middle-east/culture.htm
Global Connections http://www.pbs.org/wgbh/globalconnections/mideast/themes/culture/
Cultural Awareness Documents http://cgsc.leavenworth.army.mil/carl/resources/biblio/cultural.asp
http://www.au.af.mil/au/awc/awcgate/awc-lesn.htm
The Iraq Culture Smart Card http://cryptome.org/iraq-culture.htm
Kwikpoint Visual Language Translators http://www.kwikpoint.com/index.html
Arab Culture Comparative Cultural Patterns
http://www.sagepub.com/upm-data/11712_Chapter9.pdf
Languages Of The World http://www.nvtc.gov/lotw/
Cultural Understanding and Language Proficiency https://www.us.army.mil/suite/portal/index.jsp
The Joshua Project: Mission is to convert people to Christianity. However, the site contains a
wealth of information w/ respect to various peoples in the region, their respective languages and it can
come with a picture so one is familiar with the dress associated with that culture.
http://www.joshuaproject.net/
North Korean Short Video Clips http://www.vbs.tv/shows/north-korea/
Interactive Map: Sunni And Shia : The Worlds of Islam
http://www.pbs.org/wnet/wideangle/shows/iran/map.html
Islamic Holy Places http://en.wikipedia.org/wiki/Category:Islamic_holy_places
Online Readings In Psychology And Culture
http://www.ac.wwu.edu/~culture/contents_complete.htm
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Cyber & Information Warfare
CERT Coordination Center http://www.cert.org/
Information Operations http://www.au.af.mil/au/awc/awcgate/awc-info.htm
Information Operations http://www.tno.nl/instit/fel/infoops/
Information Warfare and Information Security on the WEB http://www.fas.org/irp/wwwinfo.html
http://www.comw.org/rma/fulltext/infowar.html
http://gib.squat.net/infowar/
Institute for the Advanced Study of Information Warfare http://www.psycom.net/iwar.1.html
infowar: Term Contexts For 'weapon'
http://www.twurled-world.com/Infowar/Update2/V_infowar_TERM_weapon.htm
The Information Warfare Site http://www.iwar.org.uk/
Ms. Guidance: Cyber War http://www.t0.or.at/msguide/cyberwar.htm
Cyber Warfare and Information Security http://securefrontiers.com/index.php?sectionID=25
The Security Portal for Information System Security Professionals
http://www.infosyssec.com/infosyssec/infowar1.htm
Georgetown Essays on Information Warfare
http://www.cs.georgetown.edu/~denning/infosec/iw-essays/
Books on subject
http://www.amazon.com/exec/obidos/ASIN/0275974235/102-7751075-0251322
http://www.amazon.com/exec/obidos/ASIN/0072132604/102-7751075-0251322
http://www.au.af.mil/au/aul/bibs/infowar/if.htm
Frontline: CyberWar (How real is the threat of war in cyberspace, and what does the White House
know that the rest of us don't? FRONTLINE investigates a new war using embedded malicious code,
probes and pings, and other weapons aimed directly at America's power grid, water supply, and
transportation systems. Examples include The Slammer (Super Bowl Sunday), Nimda (a week after 9/11),
Code Red (summer 2001), and Moonlight Maze (from Russia's Academy of Science). View the entire 52
minute program here in six consecutive chapters.)
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/view/
China’s Cyber-Militia
http://www.nationaljournal.com/njmagazine/print_friendly.php?ID=cs_20080531_6948
----------------------------------------------------------------------
Databases (Some Searchable)
Wayback Machine (The Internet Archive is building a digital library of Internet sites and other
cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians,
scholars, and the general public [works extremely well with URL addresses])
http://www.archive.org/index.php
Databases By Subject http://www.uflib.ufl.edu/subjects.html
WEB Finding Tools http://library.nps.navy.mil/home/netsearch.htm
World Basic Information Library http://wbil.fmso.osis.gov/
Digital National Security Archive http://nsarchive.chadwyck.com/
ProQuest http://proquest.umi.com/pqdweb
http://proquest.umi.com/pqdweb?RQT=573&TS=1083434519&clientId=26841&LASTSRCHMODE=3
American Religion Data Archive http://www.thearda.com/arda.asp?Show=Home
Army Libraries Directory http://www.libraries.army.mil/
CountryWatch http://www.countrywatch.com/
Early Bird http://ebird.afis.osd.mil/
Databases http://library.nps.navy.mil/home/databases.htm
Databases and Electronic Resources http://www.lib.monash.edu.au/databases/
Databases in Military Science http://library.nps.navy.mil/home/databasesmil.htm
EBSCO Support http://support.epnet.com/CustSupport/Customer/Search.aspx
http://web35.epnet.com/selectdb.asp?tb=1&_ug=sid+0603E65C%2DB41B%2D4AF8%2DBB48%2D2EA7
F7E7980E%40sessionmgr6+cp+1+1444&_us=dstb+DB+sm+DB+1D03&_uso=hd+False+C560&daerr=tr
ue
Britannica Online http://www.britannica.com/
Federal Government Resources on the WEB http://www.lib.umich.edu/govdocs/federal.html?
Google’s Uncle Sam http://www.google.com/unclesam
Government Search http://www.queryserver.com/government.htm
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
Libraries on the WEB http://sunsite.berkeley.edu/Libweb/
FirstGov http://www.firstgov.gov/
Jane’s Online Research http://online.janes.com/public/login/homeLogin.html
The Educator’s Reference Desk http://www.eduref.org/
Pro Fusion http://www.profusion.com/index.htm
RootsWeb http://www.rootsweb.com/
Government Databases http://library.stmarytx.edu/acadlib/doc/electronic/dbases.htm
Government Printing Office http://www.gpoaccess.gov/
Search Systems http://www.searchsystems.net/
U.S. National Archives and Records Administration http://www.archives.gov/index.html
National Inventory of Dams http://crunch.tec.army.mil/nid/webpages/nid.cfm
Navigating the Military Internet
http://cc.msnscache.com/cache.aspx?q=852058223709&lang=en-US&FORM=CVRE3
Naval War College Library http://www.nwc.navy.mil/LIBDB/dblinks/ezlibRemote.htm
Pentagon Library http://www.hqda.army.mil/library/databases.htm
UNBISNET http://unbisnet.un.org/
Periscope http://www.periscope.ucg.com/index1.shtml
Reference Desk http://www.earthstation9.com/index.html?aircraf6.htm
Organized Crime and Corruption Bibliographic Database Search
http://www.yorku.ca/nathanson/search.htm
DOD and Military Electronic Journals http://www.au.af.mil/au/aul/periodicals/dodelecj.htm
The Wednesday Report - Canada's Aerospace and Defence Weekly
http://twr.mobrien.com/index.shtml
Direct Search http://www.freepint.com/gary/direct.htm
The Invisible WEB http://www.invisible-web.net/
Complete Planet http://aip.completeplanet.com/aipengines/
browse?thisPage=%2Fbrowse%2Fbrowse.jsp&successPage=%2Fbrowse%2Fbrowse.jsp&error
Flag=&errorMsg=&event=loadPageEvent&directPage=&directSection=4&treeQueryExpr=&treeQueryTyp
e=phrase&treeQueryTarget=tree
U.S. Federal Government Agencies Database http://www.lib.duke.edu/texis/uslinks/uslinks
The Academic Web Link Database Project http://cybermetrics.wlv.ac.uk/database/
Patent Searching http://www.bl.uk/collections/patents.html
Databases On The World Wide WEB http://www.wehi.edu.au/resources/databases.html
Federal Bulletin Board GPO Access http://fedbbs.access.gpo.gov/
GPO Access Online http://www.gpoaccess.gov/databases.html
Google Scholar http://scholar.google.com/
Cold War Black Projects http://area51specialprojects.com/
Find Databases http://wwwapp.cc.columbia.edu/ldpd/app/rti/index.jsp
Those Dark Hiding Places http://library.rider.edu/scholarly/rlackie/Invisible/Inv_Web_Main.html
Georgetown University Library http://www.library.georgetown.edu/advisor/index.cfm
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
Government Information Databases http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html
Nuclear Weapons Database http://www.cdi.org/nuclear/database/
Terrorism Database Project http://www.rand.org/ise/projects/terrorismdatabase/
Ballistic Missiles http://www.missilethreat.com/missiles/
Terrorist Attacks and Organizations Database
http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/
Military Factory http://www.militaryfactory.com/
The Jamestown Foundation http://www.jamestown.org/
Lookups (easily search over 30 databases for the information you want)
http://www.melissadata.com/lookups/index.htm
International Programs Center (part of the population division of the U.S. Census Bureau)
http://www.census.gov/ipc/www/
Sustainable World (This site has been developed to help government officials, students,
researchers and others interested in development issues to find free [or at least reasonably
Affordable] sources of national economic and social data online)
http://www.sustainableworld.com/
Searchable Terrorism Knowledge Database http://www.tkb.org/AdvancedSearch.jsp
Latin America Data Base (LADB is the first Internet-based news service in English about Latin
America, publishing in-depth coverage of Latin American affairs since 1986)
http://ladb.unm.edu/
ResearchBuzz (News about search engines, databases, and other information collections)
http://www.researchbuzz.com/wp/
Hudson Institute http://www.hudson.org/
(Center on Islam, Democracy, and the Future of the Muslim World)
http://www.futureofmuslimworld.com/
Science & Technology Database http://www.stn-international.de/
International Database US Census Bureau http://www.census.gov/ipc/www/idbnew.html
Guide to Foreign and International Legal Databases http://www.law.nyu.edu/library/foreign_intl/
The Middle East Media Research Institute http://www.memri.org/index.html
Global Terrorism Analysis http://jamestown.org/terrorism/archives.php?publication_id=15
The National Security Archive http://www.gwu.edu/~nsarchiv/
STINET MultiSearch (STINET MultiSearch is a STINET feature intended to assist the DOD
community to access pertinent scientific and technical information over a wide range of sources)
http://multisearch.dtic.mil/
Public STINET http://stinet.dtic.mil/
Energy Files (At this site you will find over 500 databases and Web sites containing information
and resources pertaining to science and technology of interest to the Department of Energy, with an
emphasis on the physical sciences) http://energyfiles.osti.gov/
Science Research (a free, publicly available web portal allowing access to numerous scientific
journals and public science databases. It allows students, teachers, professors, researchers, and the
general public to access pertinent science information quickly and easily)
http://www.scienceresearch.com/search/
Terrorism Monitor Archives http://www.jamestown.org/terrorism/archives.php?publication_id=9
International Relations And Security Network http://www.isn.ethz.ch/
Monterrey Institute Of International Studies http://www.cns.miis.edu/
Directory of Open Access Journals http://www.doaj.org/
Satellite Database
http://www.ucsusa.org/global_security/space_weapons/satellite_database.html
Search For Buildings Anywhere On Earth http://www.emporis.com/en/
Government Databases by Subject http://www.ulib.iupui.edu/subjectareas/gov/dbalpha.html
http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
Databases by Subject http://www-library.st-andrews.ac.uk/External/databasessubject.html
http://www.co.henrico.va.us/library/DB&Web/ERpubsubj.htm
http://www.uflib.ufl.edu/subjects.html
USGS Map Databases http://education.usgs.gov/common/map_databases.htm
BUBL LINK Catalogue: Selected Internet resources covering all academic subject areas.
http://www.bubl.ac.uk/
Authoratory (The content of Authoratory is produced by a computer program analyzing millions
of articles indexed by PubMed. The articles published by each author are carefully inspected to create a
personalized report. All of the reports all available here on the Authoratory web site)
http://www.authoratory.com/
Telecommunications Database http://www.telcodata.us/
MIPT Terrorism Knowledge Base http://www.tkb.org/Home.jsp
Directory Of Open Access Journals (Welcome to the Directory of Open Access Journals. This
service covers free, full text, quality controlled scientific and scholarly journals. We aim to cover all
subjects and languages. There are now 2686 journals in the directory. Currently 803 journals are
searchable at article level. As of today 133242 articles are included in the DOAJ service
http://www.doaj.org/
FedWorld http://www.fedworld.gov/
The University of Michigan Library Documents Center http://www.lib.umich.edu/govdocs/
The Library of Congress http://www.loc.gov/index.html
International Terrorist Symbols Database http://www.adl.org/terrorism/symbols/default.asp
EUROPA European Union Databases By Subject
http://europa.eu/geninfo/info/guide/dbsubject/index_en.htm
Government Databases By Subject http://www.ulib.iupui.edu/subjectareas/gov/dbsubject.html
The Best Online Research Apps/Sites You’ve Never Heard Of
http://oedb.org/library/features/best-online-research-sites
Joint Information Systems Committee http://www.jisc.ac.uk/
Global Terrorism Database http://www.start.umd.edu/data/gtd/
Nation Master http://www.nationmaster.com/index.php
State Master http://www.statemaster.com/index.php
National Defense Mega Directory http://www.nationaldefensemegadirectory.com/
-----------------------------------------------------------------
Datamining Tools
NationMaster http://www.nationmaster.com/index.php
Tools For Data Mining http://www.ncbi.nlm.nih.gov/Tools/
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Department of Homeland Security
Vehicle Guideline http://www.nbpc.net/Miscellaneous/VEHICLE_.PDF
Surveillance Truck http://eyeball-series.org/dhs-truck.htm
DHS Daily Open Source Infrastructure Report
http://www.dhs.gov/xinfoshare/programs/editorial_0542.shtm
The Department of Homeland Open Source Enterprise has launched their "Introduction to Open
Source" Online Training Modules to Intelink-U. https://www.intelink.gov/sites/dhs-ose/training/default.aspx
----------------------------------------------------------------------------
Domain Name Servers
All Domains http://www.allwhois.com/
WHOIS Database Search http://www.arin.net/whois/index.html
Host Name to IP Address http://www.hcidata.co.uk/host2ip.htm
Internet Query Tools http://www.demon.net/external/
DNS Lookup http://hunterftp.hunter.com/scripts/dnslookup.html
http://www.zoneedit.com/lookup.html?ad=goto&kw=nslookup
DNS Stuff http://hunterftp.hunter.com/scripts/dnslookup.html
http://webreference.com/cgi-bin/nslookup.cgi
http://www.dnsstuff.com/
---------------------------------------------------
Drugs and Terrorism And Criminal Organizations
The Narco News Bulletin (I would treat this one lightly, credibility is suspect)
http://www.narconews.com/
Drug War Clock http://www.drugsense.org/wodclock.htm
Drugs and Terrorism: A New Perspective (dated but useful)
http://www.dea.gov/pubs/intel/02039/02039.html
How Drug Prohibition Finances and Otherwise Enables Terrorism
http://www.cfdp.ca/eoterror.htm
How the Drug War in Afghanistan Undermines America’s War on Terror
http://www.cato.org/pubs/fpbriefs/fpb84.pdf
The Links Between Drug Prohibition and Terrorism http://www.cfdp.ca/terror.htm
Useful Sites http://faculty.maxwell.syr.edu/levitsky/useful_websites.htm
Afghanistan Drugs and Terrorism http://wwwc.house.gov/international_relations/108/91798.pdf
Crime, Drug Prohibition and Terrorism: An Inevitable Convergence http://www.narcoterror.org/
Mini Submarine http://www.saag.org/%5Cpapers14%5Cpaper1312.html
Common Sense for Drug Policy http://www.csdp.org/news/news/colombia.htm
The Real Drug Lords http://www.serendipity.li/cia/blum1.html
Drug Cartels and Other Organized Crime Groups
http://www.drugstory.org/drug_traffic/cartel_organized.asp
Mexico Fights US Drug War http://www.csdp.org/news/news/mexico.htm
The Globalization Of The Drug Trade http://www.unesco.org/most/sourdren.pdf
Drugs And Criminal Organizations http://www.interpol.int/Public/Drugs/default.asp
The Media Awareness Project - A worldwide network dedicated to drug policy reform. We inform
public opinion and promote balanced media coverage. http://mapinc.org/
Economic/Financial
Agora Financial's 5 Minute Forecast http://www.agorafinancial.com/5min/
Behind Enemy Lines http://realestateandhousing2.blogspot.com/
Bespoke Investment Group http://bespokeinvest.typepad.com/
Clusterf*ck Nation http://jameshowardkunstler.typepad.com/
Depression2.tv http://www.depression2.tv/d2/
ETF Digest http://www.etfdigest.com/davesDaily.php
Financial Armageddon http://www.financialarmageddon.com/
Fund My Mutual Fund http://www.fundmymutualfund.com/
Interest Rate Roundup http://interestrateroundup.blogspot.com/
Jim Sinclair's Mineset http://www.jsmineset.com/
Kitco.com (Contributed Commentaries) http://www.kitco.com/ind/index_date.html
Mish's Global Economic Analysis http://globaleconomicanalysis.blogspot.com/
Money and Markets http://www.moneyandmarkets.com/index.php
Of Two Minds http://www.oftwominds.com/blog.html
Patrick.net http://patrick.net/housing/crash.html
Red Hot Resources http://www.redhotresources.blogspot.com/
Roseman Eruptions http://rosemanblog.sovereignsociety.com/
The Real Deal http://realdealfinancial.blogspot.com/
24hGOLD http://www.24hgold.com/default.aspx
Seeking Alpha http://seekingalpha.com/
Search and Register Domain Names http://namedroppers.com/
Domain Name Search http://www.wizbit.net/whois2.php
http://domainsearch.com/
Domain Surfer http://domainsurfer.com/
Domainator http://www.e-gineer.com/domainator/index.phtml
Geektools http://www.geektools.com/whois.php
InterNic http://www.internic.net/whois.html
Multiple DNS Lookup http://www.bankes.com/nslookup.htm
Webserver Search http://news.netcraft.com/
Query the APNIC Whois Database http://www.apnic.net/apnic-bin/whois.pl
RIPE Whois Search http://www.ripe.net/perl/whois
Check Domain http://www.checkdomain.com/
Super DNS Lookup http://cgibin.erols.com/ziring/cgi-bin/nsgate/gate.pl
Network Administrators Guide http://www.ibiblio.org/mdw/LDP/nag/node1.html
Query Tools http://www.wdi.co.uk/testTools/querytools.phtml
Internet Tools http://www.wowarea.com/english/help/tools.htm
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Economic/Financial
Agora Financial's 5 Minute Forecast http://www.agorafinancial.com/5min/
Behind Enemy Lines http://realestateandhousing2.blogspot.com/
Bespoke Investment Group http://bespokeinvest.typepad.com/
Clusterf*ck Nation http://jameshowardkunstler.typepad.com/
Depression2.tv http://www.depression2.tv/d2/
ETF Digest http://www.etfdigest.com/davesDaily.php
Financial Armageddon http://www.financialarmageddon.com/
Fund My Mutual Fund http://www.fundmymutualfund.com/
Interest Rate Roundup http://interestrateroundup.blogspot.com/
Jim Sinclair's Mineset http://www.jsmineset.com/
Kitco.com (Contributed Commentaries) http://www.kitco.com/ind/index_date.html
Mish's Global Economic Analysis http://globaleconomicanalysis.blogspot.com/
Money and Markets http://www.moneyandmarkets.com/index.php
Of Two Minds http://www.oftwominds.com/blog.html
Patrick.net http://patrick.net/housing/crash.html
Red Hot Resources http://www.redhotresources.blogspot.com/
Roseman Eruptions http://rosemanblog.sovereignsociety.com/
The Real Deal http://realdealfinancial.blogspot.com/
24hGOLD http://www.24hgold.com/default.aspx
Seeking Alpha http://seekingalpha.com/
----------------------------------------------
Gangs The NWO runs most of these.
Know Gangs: Recent Gang Videos http://www.knowgangs.com/gang_resources/menu.php
http://www.knowgangs.com/
All Crip Gangs in Los Angeles County http://www.streetgangs.com/crips/index.html
Organized Crime Web Links http://www.yorku.ca/nathanson/Links/links.htm
Gangs 101 http://www.lincolnnet.net/users/lrttrapp/block/gangs101.htm
Gangs Or Us http://www.gangsorus.com/
Gangs http://www.geocities.com/Athens/4111/nogangs.html
http://www.angelfire.com/biz4/stopvarriowar/gps.html
Gang Intelligence Unit
http://www.charmeck.org/Departments/Police/About+Us/Departments/Gang+Intelligence+Unit.htm
Motorcycle Gangs Or Mafia http://www.nagia.org/Motorcycle_Gangs.htm
Organized Crime And Political Corruption http://www.ipsn.org/
Gangs Before Thrasher http://gangresearch.net/Archives/UIC/Courses/history/beforethrash.html
Gang Research http://gangresearch.net/
http://tigger.uic.edu/~huk/Gang%20History/Citygangs.html
http://www.ericdigests.org/pre-9216/gangs.htm
Gangs Around The World http://www.uic.edu/orgs/kbc/gangresources/Intgangs.html
http://gangresearch.net/Globalization/regions/intgangs.html
Identifying Gang Members http://www.polksheriff.org/library/gangs/identifying.html
Gang Symbols/Signs http://www.velocity.net/~acekc/gangsymbols.htm
http://www.velocity.net/~acekc/gangsign.htm
http://ga.essortment.com/gangsignsands_reyp.htm
Gang Awareness http://www.sanantonio.gov/sapd/pdf/Awareness.pdf
Gang Handbook http://www.gov.mb.ca/justice/safe/gangproof/ganghandbook2004.pdf
Gangs In Texas http://www.oag.state.tx.us/AG_Publications/pdfs/97gang.pdf
Clantone 14 http://www.clantone.net/mainpage.html
Gangs Speak For Themselves http://tigger.uic.edu/~huk/Gang%20History/Gangs.html
All Blood Gangs In Los Angeles County http://www.streetgangs.com/bloods/
Crips http://www.streetgangs.com/crips/
Hispanic Gangs In Los Angeles County http://www.streetgangs.com/hispanic/
Asian Gangs In Los Angeles County http://www.streetgangs.com/asian/
18th Street Gang http://www.streetgangs.com/18thstreet.html
Territory Maps of Gangs in Los Angeles http://www.streetgangs.com/maps/
Female Gangs In America http://www.uic.edu/orgs/kbc/Female.html
http://www.angelfire.com/theforce/gps0/FemaleGangs.html
Street Gang Websites & Related Links http://www.angelfire.com/biz4/stopvarriowar/gps.html
Know Gangs http://www.knowgangs.com/gang_001.htm
Mara Salvatrucha http://www.the-solution.org/ms13.htm
http://home.comcast.net/~jackhydn1/structure.htm
http://www.islandpacket.com/news/local/story/5711073p-5115080c.html
http://www.flickr.com/photos/brianwisconsin/search/tags:MS-13/
http://www.rockawave.com/news/2005/0708/Front_Page/003.html
http://home.comcast.net/~jackhydn1/FFXPolicePres.pdf
Gang Prevention Publications
http://www.dojconnect.com/docs/resources/Gang_Prevention_Resources.pdf
Gang Profiles http://cryptome.org/13gangs.htm
Gang and Security Threat Group Awareness http://www.dc.state.fl.us/pub/gangs/index.html
The Psychology of Criminal Behaviour http://www.athabascau.ca/courses/crjs/360/index.html
Bloods And Crips http://www.dc.state.fl.us/pub/gangs/la.html
Street Gangs: A Dead End http://www.fmuniv.edu/urbanaffairs/Street%20Gangs.pdf
The Reality Of Gangs http://www.ncpc.org/cms/cms-upload/ncpc/files/gangs.pdf
Youth Gangs http://www.ed.gov/admins/lead/safety/training/gangs/day1_pdf.pdf
Gangs Or Us http://www.gangsorus.com/graffiti.html
2005 National Gang Threat Assessment
http://www.stripes.com/07/feb07/gangs/2005_NAGIA_Assessment.pdf
Review Of Gang Activity Affecting The Army
http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf
Gang-Related Activity in the US Armed Forces Increasing
http://www.stripes.com/07/feb07/gangs/ncis_gangs.pdf
Gangs In The Military Video http://www.militaryspot.com/videos/video72.htm
Gang Activity In The U.S. Military http://usmilitary.about.com/od/justicelawlegislation/a/gangs.htm
Gang Signs http://zimmer.csufresno.edu/~haralds/htmlfiles/gang-signs.html
Gangs Spreading In The Military
http://www.cbsnews.com/stories/2007/07/28/eveningnews/main3107316.shtml?source=RSSattr=HOME_
3107316
Gang Related Activity In The Armed Forces
http://militarytimes.com/static/projects/pages/ngic_gangs.pdf
Gang Activity Threat Assessment http://www.stripes.com/07/feb07/gangs/2006_CID_Report.pdf
List Of California Street Gangs http://en.wikipedia.org/wiki/List_of_California_street_gangs
Gang Signal http://en.wikipedia.org/wiki/Gang_signal
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
Homeland Security
HomeLand Security Today http://hstoday.us/
Gateway to Homeland Security http://www.au.af.mil/au/awc/awcgate/awc-hmld.htm
Brookings Institution Project on Homeland Security
http://www.brook.edu/dybdocroot/fp/projects/homeland/homeland.htm
Center for State Homeland Security
http://www.cshs-us.org/CSHS/cshs.nsf/Main/CounterTerrorismReports
Department of Homeland Security http://www.dhs.gov/dhspublic/
Are You Ready? http://www.fema.gov/areyouready/
GAO Homeland Security http://www.gao.gov/docsearch/featured/homelandsecurity.html
Homeland Security Monitor http://www.homelandsecuritymonitor.com/index.htm
State Homeland Security WEB Sites http://www.nga.org/cda/files/HOMESECSTRUCTURES.PDF
http://www.nga.org/center/security/
FOR OFFICIAL USE ONLY 38
Homeland Security Guidelines http://cryptome.org/homesec-kyagb.htm
Homeland Security Weekly http://www.homelandsecurityweekly.com/lastissue.html
National Homeland Security Knowledge Bas http://www.twotigersonline.com/resources.html
The Heritage Foundation http://www.heritage.org/Research/HomelandDefense/index.cfm
Online References and Resources http://chppm-www.apgea.army.mil/HomelandSecurity/
http://www.globalsecurity.org/security/index.html
Department of Homeland Security Spy Vehicle http://cryptome.org/dhs-truck.htm
Homeland Security Online http://www.hitechcj.com/homelandsecurity/
Homeland Security Solutions International http://www.homelandsecurityssi.com/
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
  IMINT
             IMINT And Analysis (Open source military analysis, strategic thinking, and Google Earth imagery
interpretation)                                                                                                      http://geimint.blogspot.com/
             Imagery Intelligence Part I and II     http://dataink.blogspot.com/2007/03/imagery-intelligence.html
                                                            http://dataink.blogspot.com/2007/10/imagery-intelligence-part-ii.html
             IMINT 101 Introduction To Imagery Intelligence                  http://ftp.fas.org/irp/imint/imint_101.htm
             Do It Yourself Imagery Analysis 
                                               http://soobdujour.blogspot.com/2008/01/do-it-yourself-imagery-analysis.html
             HUMINT, IMINT, MASINT, SIGINT, OSINT: Finding What Shouldn’t Be Found 
                                              http://risrecbooks.blogspot.com/2008/02/humint-imint-masint-sigint-osint.html
             Satellite Sensors (Learn more about each sensor and view sample satellite imagery)
                 ALOS
             ASTER
              CARTOSAT-1
                      CBERS-2
              FORMOSAT-2
                     GeoEye-1
                      IKONOS
                 LANDSAT 7
                    QuickBird
                       SPOT-5
                WorldView-1
             Counter IMINT: The Syrian Deception
                                                        http://verificationthoughts.blogspot.com/2008/05/syrian-deception.html
---------------------------------------------------------------------------
Intelligence Resources
             Intelligence Resources                                  http://www.intelligenceisthefuture.com/resources.htm
             Studies in Intelligence                        http://www.cia.gov/csi/studies/vol50no2/html_files/index.html
             The Intelligence Officer’s Bookshelf
                                                http://www.cia.gov/csi/studies/vol50no2/html_files/Bookshelf_10.htm
             Police Intelligence Operations                              http://www.fas.org/irp/doddir/army/fm3-19-50.pdf
             World Check – Reducing Risk Through Intelligence                            http://www.world-check.com/
             Intelligence Journals
                                              http://www.columbia.edu/cu/lweb/indiv/lehman/guides/intell.html#background
 
 
           International Intelligence Agencies
             International Government Intelligence Agencies
                                                                                 http://members.tripod.com/spylopedia/ind-intlagen.htm
             International Links                                                       http://www.route66patrol.com/INTLINKS.htm
             MILNET: Intelligence Agencies by Function                               http://www.milnet.com/iagency.htm
             World Intelligence and Security Agencies                             http://www.fas.org/irp/world/index.html
             List of Intelligence Agencies                                                                    http://www.sagal.com/ajax/
                                                                                                  http://www.loyola.edu/dept/politics/intel.html
             
           Internet Privacy and Security
             Ad-Aware                                                                          http://www.lavasoft.de/software/adaware/
             Analyzer                                                                                           http://analyzer.polito.it/30alpha/
             Bugnosis                                                                                                     http://www.bugnosis.org/
             Cybercrime                                                                                             http://www.cybercrime.gov/
             CERT                                                                                                                  http://www.cert.org/
             Hacker and Spyware Protection                                       http://www.looknstop.com/En/index2.htm
             Email Security and Privacy                                                            http://www.stealthmessage.com/
             Home Network Security                                      http://www.cert.org/tech_tips/home_networks.html
             Privacy and Security                                                      http://www.markusjansson.net/eienbid.html
             Lavasoft                                                                                                 http://www.lavasoftusa.com/
             Leak Test                                                                                              http://grc.com/lt/leaktest.htm
             Setting up Security Zones  http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx
             Shields Up                                                                                          http://grc.com/su-firewalls.htm
             Anti Spyware Tools                                                              http://www.spychecker.com/home.html
             Spyware Reviews                                                                                     http://removespyware.net/
             Guide to Online Privacy                                      http://www.cdt.org/privacy/guide/basic/topten.html
             Virus List                                                                                http://www.viruslist.com/en/index.html
             WebWasher                                                                                          http://www.webwasher.com/
             Snooper                                                                                                              http://snoop.cdt.org/
             Security Advisers                                                                                           http://www.wilders.org/
             Spyware and Adware Removal                                        http://www.paretologic.com/xoftspy/lp/14/
             Top Secret Software                                                   http://www.topsecretsoftware.com/index.html


               
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
   Military Operations in Urban Terrain (MOUT)
             Center For Army Lessons Learned                                                                      http://call.army.mil/
                                                                  http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART5.htm
             Close Combat in The Urban Environment
                                              http://www.globalsecurity.org/military/library/report/2001/closecombat2.ppt#1
             Military Operations In Urban Terrain                   
                                                                  http://www.inscom.osis.gov/ngic/NGIC-1122-0062-01/ART4.htm
                                                                                       http://www.globalsecurity.org/military/ops/mout.htm
             The MOUT Homepage                                    http://www.geocities.com/Pentagon/6453/techa.html
             Theater of Urban Warfare
                                                   http://www.globalsecurity.org/org/news/2003/030328-urbanwarfare01.htm
             Urban Operations: A Historical Casebook
                                      http://www.globalsecurity.org/military/library/report/2002/urbanoperationsintro.htm
             Urban Battle Fields of South Asia Lessons Learned from Sri Lanka, India, and Pakistan
                                                                   http://www.rand.org/pubs/monographs/2004/RAND_MG210.pdf
             Small Wars Journal (lots of reference material on MOUT)           http://www.smallwarsjournal.com/
             The Urban Operations Journal                                                    http://urbanoperations.8media.org/
             Street Smart: Intelligence Preparation of the Battlefield for Urban Operations
                                                                http://www.rand.org/pubs/monograph_reports/MR1287/index.html
             Small Wars Center of Excellence             http://www.smallwars.quantico.usmc.mil/sw_manual.asp
             Small Wars Registered User              http://www.smallwars.quantico.usmc.mil/RegsiteredUser.pdf
             Unrestricted Warfare                      http://www.jhuapl.edu/urw_symposium/pages/proceedings.htm
             Irregular Warfare Special Study 
                                               http://merln.ndu.edu/archive/DigitalCollections/IrregWarfareSpecialStudy.pdf
             Irregular Warfare Specialty Track                           http://www.usma.edu/dmi/irregular_warfare.htm
             A Ner Era Of Irregular Warfare
     http://www.usma.edu/dmi/IWmsgs/A%20Canadian%20Perspective%20of%20Irregular%20Warfare.pdf
             Irregular Military                                                           http://en.wikipedia.org/wiki/Irregular_military
             The U.S. Army And Irregular Warfare     http://www.wooster.edu/history/jgates/book-contents.html
             History Of Irregular Warfare   
                          http://www.sais-jhu.edu/programs/ir/strategic/courses/docs/irregular_warfare_syllabus.pdf
             Some Thoughts On Irregular Warfare          https://www.cia.gov/csi/studies/96unclass/iregular.htm
             Complex Irregular Warfare
                                    http://www.fpri.org/enotes/20060106.military.hoffman.complexirregularwarfare.html
             Small Wars Journal                                                                http://smallwarsjournal.com/index.php
             Small Wars Journal Research Links       http://smallwarsjournal.com/research/#OnlineJournalFree
             Minimanual Of The Urban Guerilla                                             http://news.skilluminati.com/?p=33
             Chinese Report On Unrestricted Warfare                                   http://news.skilluminati.com/?p=14
             Counterinsurgency Army Web Page
                                                 https://www.us.army.mil/suite/page/451386?c=YmVuLmJlbmF2aWRlcw==
             Unrestricted Wrafare Symposium 2007
     http://www.jhuapl.edu/urw_symposium/pages/proceedings/2007/chapters/URW%202007%20Book.pdf
                                                            http://www.jhuapl.edu/urw_symposium/pages/proceedings2007.htm
             Unrestricted Warfare                                                                     http://www.cryptome.org/cuw.htm
             Small Wars And Low Intensity Conflicts Currently Taking Place Throughout The World
http://mediavillage.net/test/modules.php?op=modload&name=News&file=article&sid=2299&mode=th
-----------------------------------------------------------------------------------------------------
 Open Source Center (formerly the Foreign Broadcast Information Service)
               Log-In (requires registration)                                                                http://www.opensource.gov
               Open Source Center Map Library                                                    https://www.intelink.gov/maps/
 
 
          Open Source Intelligence Links
             Foreign Military Studies Office                            http://fmso.leavenworth.army.mil/RESRCHLK.htm
             Naval Open Source Intelligence                                                                         http://www.nosi.org/
             Naval Open Source Intelligence Blogspot                                               http://nosint.blogspot.com/
             Open Source Intelligence
                                                   http://www.oss.net/extra/tools/parser/index.cgi?url=/html/parse/index.html
             Open Source Research Forum                                                    http://www.geocities.com/levittcm/
             Expanding Open Source Intelligence                        http://www.isanet.org/noarchive/hulnick2.html
             Open–Source Intelligence From the Airwaves
                                                                       http://www.cia.gov/csi/studies/fall_winter_2001/article04.html
             Open Source Collection                                     http://www.fas.org/irp/nsa/ioss/threat96/part06.htm
             Carnegie Endowment                                                               http://www.carnegieendowment.org/
             Small Wars Journal (lots of reference material and the site is created on-the-fly daily)
                                                                                                                   http://www.smallwarsjournal.com/
             World Facts                                                                                                         http://worldfacts.us/
             Power and Interest News Report (independent organization that utilizes open source intelligence 
             to provide conflict analysis services in the context of international relations)
                                                                                                                        http://www.pinr.com/index.php
             Center for Media and DemocracyCenter for Media and Democracy           http://www.prwatch.org/
             Strategy Page                                                                                     http://www.strategypage.com/
             Intellibriefs                                                                                        http://intellibriefs.blogspot.com/
             SiloBreaker (for those of you familiar with Crimelink and Analyst Notebook link diagrams, this site
should be of great interest to you. Try it, you’ll like it!)                                       http://www.silobreaker.com/
             Global Challenges Research                                                                   http://www.axisglobe.com/
             Global Research                                         http://www.globalresearch.ca/index.php?context=home
             Defence News (World News Network)                                                       http://defencenews.com/
             National Intelligence Council                                               http://www.odci.gov/nic/NIC_home.html
             U.S. Intelligence Community                                                                  http://www.intelligence.gov/
             STRATFOR                                                                                  http://www.stratfor.com/index.php
             Stratfor Free Intelligence Reports   
                                                 https://www.stratfor.com/subscriptions/free-weekly-intelligence-reports.php
             National Security Links                                           http://www.blueriver.net/%7Ewyrm/natlsec.html
             Research and Intelligence                                                 http://www.airsecurity.com/research.htm
             Worldwide Intelligence Agencies                                          http://www.fas.org/irp/world/index.html
             National Drug Intelligence Center                                       http://www.usdoj.gov/ndic/products.htm
             Gateway to Intelligence                                      http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm
             Strategic Intelligence Links                                           http://www.loyola.edu/dept/politics/intel.html
             Gathering and Exposing Intelligence Online                             http://www.internet-intelligence.org/
             Nation Master: Where Statistics Come Alive (build your own charts)
                                                     http://www.nationmaster.com/graph-T/agr_ban_imp_sha&int=5&id=EUR
             Intelligence Resources                                               http://www.globalsecurity.org/intell/index.html
             Your Comprehensive Source for OSINT & SIGINT 24/7                        http://mediavillage.net/test/
             Threats Open Source Intelligence Gateway (requires easy registration) 
                                                                                                              http://www.tosig.com/tosig/tosig.html
             Literally Open Source Intelligence                                                                 http://osint.blox.pl/html
             Wikipedia Open Source Intelligence Inputs  http://en.wikipedia.org/wiki/Open_source_intelligence
             Open Source Intelligence Search Engine                                   http://www.intelligencesearch.com/
             World-Check Reducing Risk Through Intelligence                               http://www.world-check.com/
             Africa Intelligence                                                                         http://www.africaintelligence.com/
             Strategic Analysis And OSINT (An informative blog on issues related to its title) 
                                                                                                             http://strategicanalysis.i-blog.gr/
             The Intelligence Summit (open source news) 
                                               http://intelligence-summit.blogspot.com/2006/11/open-source-news_13.html
             Startegic Analysis And OSINT Management                                  http://strategicanalysis.i-blog.gr/
             Intellnet: The Intelligence Network                                                                http://www.intellnet.org
           Bangladesh Open Source Intelligence Monitors (Archive of South Asian Intelligence monitored
from Dhaka, Bangladesh. Daily updates and news on low intensity Regional warfare, study of National Liberation Movements, Moves by Intelligence agencies, Espionage debriefs, National Security agenda,
Corruption, Global Jihad, The US Empire ~~ and our pet peeve The India. Inc DISCLAIMER: This site is
a Bangladesh Citizens Initiative on the Net and is in no way connected to any Government or Intelligence
agency.)                http://bdosintmonitors.blogspot.com/2007/05/bdosint-monitors-digest-number-753.html
             Noah Schahtman                                                                           http://www.noahshachtman.com/
             International Security Research and Intelligence Agency                                 http://www.isria.info/
             The Intelligence Network: IntellNet is dedicated to providing individuals and groups aggregated
news and documents from around the world in an easy-to-access and understand format. Founded in
early 2000 as a private project to more easily disseminate information, during the 4 years since its
creation IntellNet proved itself to be a great source of knowledge. With today's re-launch, The Intelligence
Network will stand upon the shoulders of giants in order to see further and push higher; expanding upon
the very foundations of the U.S. Open Source Intelligence (OSINT) community.  http://www.intellnet.org/
             Space War Your World At War
                                                http://www.spacewar.com/reports/Open_Source_Intelligence_999.html
             Utilization Of Internet Tools And Resources For Open Source Intelligence 
                                                                                                                          http://www.onstrat.com/osint/
              IntelliBriefs                                              http://intellibriefs.blogspot.com/2006_03_19_archive.html
              Global Intelligence                                                                           http://www.isria.info/index2.php
              Strategy Page                                                                  http://www.strategypage.com/default.asp
             Sources And Methods   
                        http://sourcesandmethods.blogspot.com/2008/01/bahraini-foreign-minister-speaks-iiss.html
           SITE Intelligence Group Monitoring Service ("By monitoring terrorist and extremist websites and
penetrating password-protected Al Qaeda linked sites, SITE provides a state-of-the-art intelligence
service to both practitioners and analysts to understand the adversary." - Rohan Gunaratna, Author,
Inside Al Qaeda: Global Network of Terror (Columbia University Press) Studying the primary source
propaganda, training manuals, and chatter of terrorists offers insight into terrorists and their activities that
can not be obtained anywhere else. Failing to monitor terrorist propaganda is a failure in intelligence. To
fulfill this need, the SITE Intelligence Group offers its Monitoring Service, which provides numerous daily
translations of terrorist propaganda and multimedia from primary source terrorist websites.)
                                                                                                                          http://www.siteintelgroup.org/
             Open Source Intelligence: A Strategic Enabler Of National Security 
http://se1.isn.ch/serviceengine/FileContent?serviceID=PublishingHouse&fileid=B5D36B62-0E20-BC0B-
DD2E-C12E73D54892&lng=en
             Utilization Of Internet Tools And Resources For Open Source Intelligence (awesome site for the
open source analyst)                                                                                        http://www.onstrat.com/osint/             

-----------------------------------------------------
          Open Source Intelligence Support
             National Virtual Translation Center (The National Virtual Translation Center (NVTC) was
established in February, 2003 " for the purpose of providing timely and accurate translations of foreign
intelligence for all elements of the Intelligence Community.)                                          http://www.nvtc.gov/
 

The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
   Russia Hello Comrade Spooks! ;D
             Russian Strategic Nuclear Forces                                                       http://www.russianforces.org/
             GRU Spetsnaz Army                                                            http://www.spets.dk/spets_stofmrk.htm
             Russian Ground Forces                                  http://en.wikipedia.org/wiki/Russian_Ground_Forces
             Armed Forces Of The Russian Federation
                                                       http://en.wikipedia.org/wiki/Armed_Forces_of_the_Russian_Federation
             Russian Strategic Nuclear Forces                                                                http://russianforces.org/
             Russian Military Bases                   http://www.kommersant.com/p766827/Russia,_military_bases/
             Moscow Region                 http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_4.gif
                                                        http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_5.gif
             Missile Strategic Forces     http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_0.gif
             Space Forces                     http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_1.gif
             Airborne Forces                 http://www.kommersant.com/photo/max/WEEKLY/2005/007/map_2.gif 
             World’s Armed Forces Forum                           http://www.network54.com/Forum/211833/page-11
             Russian Analytical Digest                                                               http://www.isn.ethz.ch/news/rad/
             Russian Air Force Order Of Battle                                                      http://www.scramble.nl/ru.htm
             Russian Navy Order Of Battle                                        http://www.rkka.org/russiran/russnavy.html
             Russian Army Order of Battle – 1996
                                                                          http://www.fas.org/nuke/guide/russia/agency/army-oob.htm
             Russian Order Of Battle Links                                                    http://demo.carrot2.org/demo-
table/search?in=Web&q=russian+order+of+battle&s=100&alg=Lingo&opts=h
             Russian Collectibles                                                           https://www.collectrussia.com/index.cfm
                                                                                                                                            http://www.soviet-
awards.com/forum/vbclassified.php?s=022589c82ee918a1bc349bd20683482a&do=ad&id=166
                                                                                                                       http://www.soviet-awards.com/
-------------------------------------------------------------
Satellite and Space Views (real time)  
             Satellite and Space Views                                     http://www.leonardsworlds.com/info/satellite.htm
             Space Imaging                                                                                           http://spaceimaging.com/
             Real Time Satellite Tracking                                                   http://www.n2yo.com/satellites/?c=30
-------------------------------------------------------------------
Secret Armies
             Secret Armies                                                                    http://www.secretarmies.com/index.html
--------------------------------------------------------------
A FAVORITE Of Our Global Masters
Terrorism
             Global Terrorism Analysis
                                                      http://www.jamestown.org/terrorism/news/article.php?articleid=2369824
             Global Terrorism Database                                                         http://www.start.umd.edu/data/gtd/
             Office of Anti-Terrorism Assistance                                             http://www.diplomaticsecurity.org/
             Terrorism                                                                        http://www.users.fl.net.au/~nds/terror.html
                                                                                    http://www.cdi.org/program/index.cfm?programid=39
                                                                                                                    http://www.nsi.org/terrorism.html
                                   http://www.awesomelibrary.org/Classroom/Social_Studies/Terrorism/Terrorism.html
             War on Terrorism Resource Guides                        http://personal.ecu.edu/durantd/wot/index.html
             International Law Terrorism                                                             http://www.un.int/usa/terror.htm
             Implementing international action against terrorism       http://www.unodc.org/unodc/terrorism.html
             UN Action Against Terrorism                                                                 http://www.un.org/terrorism/
             The World's Most Wanted Terrorists                              http://www.mostwanted.org/Terrorists.html
                                                                                       http://www.fbi.gov/mostwant/terrorists/fugitives.htm
             Terrorism Research Center                                                                       http://www.terrorism.com/
             Terrorism Portal                                                                          http://www.theterrorismportal.com/
             Terrorism Resources                                               http://library.nps.navy.mil/home/tgp/tgpndx.htm
                                                                                                 http://library.nps.navy.mil/home/tgp/tgp2.htm
                                                                      http://www.ceip.org/files/projects/npp/resources/terrorism.htm
             Terrorist Financing                                                 http://www1.oecd.org/FATF/TerFinance_en.htm
             War on Terrorism Latest News                                                             http://www.terrorismfiles.org/
             Terrorism/Counterterrorism Web Links                   http://www.usip.org/library/topics/terrorism.html
             Terrorism Questions and Answers                                      http://www.terrorismanswers.org/home/
                                                                                                                       http://cfrterrorism.org/thisweek/
                                                                                                                            http://cfrterrorism.org/index/
             Terrorism Disasters                                                 http://www.disasters.org/emgold/Terrorism.htm
             Terrorism and Terrorists                                         http://jurist.law.pitt.edu/terrorism/terrorism1.htm
             Terrorism, Anti-Terrorism, Taliban and Afghanistan Links
                                                                                         http://www.windweaver.com/politics/terrorism.htm
             Terrorism 2004                                          http://www.au.af.mil/au/aul/bibs/terrornew/terrorism.htm
             South Asia Terrorism Portal                                                                               http://www.satp.org/
             Terrorism and Homeland Security                            http://www.rand.org/research_areas/terrorism/
             WWW Sites related to Terrorism                                                     http://www.sima.co.at/terror.htm
                                                                                                          http://www.jmu.edu/orgs/wrni/links.html
                                                                                                       http://www.blkbox.com/~guillory/terr.html
             Patterns of Global Terrorism                         http://www.mipt.org/Patterns-of-Global-Terrorism.asp
             International Global War on Terrorism                http://www.au.af.mil/au/awc/awcgate/cps-terr.htm
             Terror Analysis                                                                                   http://www.terroranalysis.com/
             Comprehensive Guide to International Terrorist Organizations
                                                            http://www.specialoperations.com/Terrorism/SOCGuide/Default.htm
             Terrorist Group Profiles
                                                  http://www.specialoperations.com/Terrorism/Terrorist_Groups/Default.htm
             Terrorism Knowledge Base                                                                   http://www.tkb.org/Home.jsp   
     A Military Guide To Terrorism In The 21st Century
                                                                                       http://www.au.af.mil/au/awc/awcgate/army/guidterr/
             Terror Group Emblems                                     http://www.osis.gov/docs/TerrorGroupEmblems.pdf
             Fighting Terror                                 http://www.cnn.com/SPECIALS/2004/fighting.terror/index.html
             Terrorism Unveiled                                                                          http://athena.blogs.com/athena/
             Global Terrorr Alert                                                                        http://www.globalterroralert.com/
             Guide to Research Terrorism and Insurgency   
                                                                                      http://www.library.georgetown.edu/guides/terrorism/
                                                                                 http://www.library.georgetown.edu/guides/right.htm#int
             Terrorism Database Project                              http://www.rand.org/ise/projects/terrorismdatabase/
             Terrorist Attacks and Organizations   
                                                                  http://www.washingtonpost.com/wp-dyn/world/issues/terrordata/
             Terrorism Research                            http://www.washburn.edu/faculty/aschbley/publications.html
             Nuclear Terrorism                                                                                 http://www.nci.org/nci-nt.htm
                                                                                                                     http://www.nuclearterrorism.org/
                                                                                                           http://www.fas.org/irp/crs/RL32595.pdf
             What If Terrorists Go Nuclear                                             http://www.cdi.org/terrorism/nuclear.cfm
             Targeting The Threat (TrackingTheThreat.com is a database of open source information about
                the Al Qaeda terrorist network and you can search the database by terrorist name)
                                                                                                    http://www.trackingthethreat.com/index.jsp
             Tracking The Terror                                                 http://www.cnn.com/US/tracking.terror/archive/
             Global Terrorism Analysis                                                        http://www.jamestown.org/terrorism/
                                                              http://www.jamestown.org/terrorism/archives.php?publication_id=9
             South Asia Terrorism Updates                                                                           http://www.satp.org/
             Interactive United States/Afghanistan War Machine
                                                                                             http://www.satp.org/satporgtp/usa/Osama.htm#
             South Asia Conflict Map             http://www.satp.org/satporgtp/southasia/images/Conflict_Map.pdf
             Geography Of Terrorism                     http://www.yourdictionary.com/library/terror.html#geography
             Searchable Terrorism Knowledge Database                      http://www.tkb.org/AdvancedSearch.jsp
             Jihadi and Islamist Activities on MySpace.com             http://www.nbcnco.com/MySpaceJihad.pdf
             A Picture Speaks A Thousand Words            http://www.st-andrews.ac.uk/~ilr/emblems/index.html
             Terrorism Focus                                 http://jamestown.org/terrorism/news/uploads/tf_002_015.pdf
             Global Terrorism Analysis               http://jamestown.org/terrorism/archives.php?publication_id=15
             Terrorism and Crime Studies                                                http://www.loc.gov/rr/frd/terrorism.html
             Gobs And Gobs Of Terrorism Links                           http://library.nps.navy.mil/home/terrorism.htm
             World Conflict Quarterly (News, Analyis and Articles on Terrorists & Terrorism) 
                                                                                             http://www.globalterrorism101.com/
                                                  http://www.globalterrorism101.com/UnderstandingTerrorismSummary.html
             How Modern Terrorism Uses The Internet          http://www.usip.org/pubs/specialreports/sr116.pdf
             Terrorism Archived Records                         http://rantburg.com/thugburg.php?ORGEX=Al-Qaeda
             Congressional Research Service Reports on Terrorism
                                                                                                    http://www.fas.org/sgp/crs/terror/index.html
             South Asia Terrorism Portal                                                                               http://www.satp.org/
             Combatting Terrorism Center At West Point                   http://www.ctc.usma.edu/atlas/default.asp
             Cross Border Financing                       http://www.fincen.gov/cross_border/CBFTFS_Complete.pdf
             Terrorist Selection And Recruitment    http://www.rand.org/pubs/reprints/2006/RAND_RP1214.pdf
             Beyond Al Qaeda Parts 1 & 2       http://www.rand.org/pubs/monographs/2006/RAND_MG429.pdf
                                                                   http://www.rand.org/pubs/monographs/2006/RAND_MG430.pdf
             Terrorism And Homeland Security: Documents Available Online 
                                                                                     http://www.rand.org/pubs/online/terrorism/index.html
             Breaching The Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive
             Technologies                                 http://www.rand.org/pubs/monographs/2007/RAND_MG481.pdf
             Terrorist Organizations                                                         http://www.terrorist-organizations.com/
             A Look At The History Of Suicide Attacks
                                                     http://www.npr.org/templates/story/story.php?storyId=4760240&sc=emaf
             MIPT Terrorism Knowledge Base                                                         http://www.tkb.org/Home.jsp
                                                                http://web.archive.org/web/20041226110228/http://www.ci-ce-
ct.com/article/showquestion.asp?faq=3&fldAuto=1393
                   http://web.archive.org/web/20041210150855/www.ci-ce-ct.com/article/showfaq.asp?fldAuto=3
             Hawala Money Laundering
                                                       http://www.interpol.int/Public/FinancialCrime/MoneyLaundering/hawala/
                                                                       http://repositories.cdlib.org/imbs/socdyn/sdeas/vol1/iss2/art6/
             Protecting Charitable Organizations   
                                                      http://www.treas.gov/offices/enforcement/key-issues/protecting/fto.shtml
             
---------------------------------------------------------------------------
Terrorist Targets (US)
             Critical Infrastructure Protection
                         http://www.eei.org/industry_issues/energy_infrastructure/critical_infrastructure_protection/
             Prototypes for Targeting America: A Soviet Assessment
                                           http://fmso.leavenworth.army.mil/fmsopubs/ISSUES/prototypes/prototypes.htm
      Foreign Terrorists in America                     http://www.fas.org/irp/congress/1998_hr/s980224c.htm
             Terrorist Attacks on Americans 1979-1988
                                                             http://www.pbs.org/wgbh/pages/frontline/shows/target/etc/cron.html
          Guarding America: Security Guards and U.S. Critical Infrastructure Protection
                                                                                                         http://www.fas.org/sgp/crs/RL32670.pdf
             Commercial Nuclear Reactor Sites as Terrorist Targets
      http://www.neis.org/literature/Reports&Testimonies/Here_today_there_tomorrow_report_10-22-01.pdf
             Transportation and The Terrorist Threat
                                                                  http://www.strom.clemson.edu/opinion/whitehurst/transterror.pdf
             Passenger Ferries Could Be Prime Terrorist Targets
                                       http://www.transportationsec.com/ar/security_passenger_ferries_prime/index.htm
             Terrorists planning to assemble bombs on planes
                                        http://transportationsec.com/ar/security_terrorists_planning_assemble/index.htm
             Target America                                            http://www.pbs.org/wgbh/pages/frontline/shows/target/
             Plan Targets Terrorist Use Of Shipping Containers
                                                                 http://www.newsmax.com/archives/articles/2002/6/7/52635.shtml
             Task Force to Bolster Security for Attractive Terrorist Targets
                      http://www.signonsandiego.com/news/nation/terror/20040419-0736-terrorism-taskforce.html
             The Top 100 Terrorist Targets in the United States (if you can steer away from the political
                comments, it makes good for further study)
                                                                               http://www.lilithgallery.com/articles/terrorist_targets.html
             Chronology of Major Terrorist Attacks Against U.S. Targets
                                                                              http://www.freerepublic.com/focus/f-news/1087538/posts
             Thoughts on Terrorist Targets                                             http://antiwar.com/utley/?articleid=1900
             Terror’s Next Target                                                                    http://www.iags.org/n0111041.htm
             Developing Trends in Terrorist Strategy
                              http://www.siteinstitute.org/terrorismlibrary/charts_maps/charts_maps_1103218242.pdf
             Mapping The Risks                       http://www.rand.org/pubs/monographs/2004/RAND_MG142.pdf
             How Terrorists Plan And Conduct An Attack On Infrastructure Targets
                                                                                                  http://www.ibtta.org/files/PDFs/bell_alan.pdf
 
           


             

             
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
   Tracerouting
             Geek Tools                                                                       http://www.geektools.com/traceroute.php
             Traceroute                                                                             http://www.tracert.com/cgi-bin/trace.pl
                                                                                                                              http://cities.lk.net/trlist.html
                                                                                                                               http://www.traceroute.org/
             Using Traceroute                          http://www.exit109.com/~jeremy/news/providers/traceroute.html
             Tracerouters Around The World                                                     http://nielssen.com/tracerouters/
             Hubble: Monitoring Internet Reachability in Real-Time                  http://hubble.cs.washington.edu/
             An Explanation Of Hubble
http://www.govtech.com/gt/articles/286661?utm_source=newsletter&utm_medium=email&utm_campaign
=GTEN_2008_4_15
--------------------------------------------------------------------------
  Water Conflict
             Water Wars                                                          http://www.ciesin.org/docs/006-304/006-304.html
                                                                             http://www.ipsnews.org/africa/interna.asp?idnews=23759
                                                                                               http://www.mideastnews.com/WaterWars.htm
             The Emerging Water Wars                                                      http://samvak.tripod.com/pp146.html
             The World’s Water                                                                     http://www.worldwater.org/links.htm
                                                                                                                              http://www.worldwater.org/
                                                                                                    http://www.worldwater.org/conflictIntro.htm
                                                                                                      http://www.worldwater.org/waterData.htm
             A World Without Water                           http://www.villagevoice.com/news/0234,otis,37614,1.html
             Water Wars in The Middle East
                                                        http://www.nmhschool.org/tthornton/mehistorydatabase/waterwars.htm
             Water Wars Worldwide                                         http://www.worldwaterwars.com/World/index.htm
-----------------------------------------------------------------------------
All that's just one post.

As I was going through the above I noticed the document a bit dated.

                          
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
INSCOM Making Spying On Your Fellow Soldier The 'EZ WAY' Using iRAT, err I mean, iSalute

iSALUTE: The U.S. Army’s Solution to the Next Bradley Manning
http://publicintelligence.net/isalute-the-u-s-armys-solution-to-the-next-bradley-manning/

The U.S. Army has launched a web-based program to encourage the reporting of suspicious activity among U.S. military personnel, including “insider threats” like that posed by alleged WikiLeaks contributor Bradley Manning.  The “iSALUTE” program, which launched in August 2011, is named for an acronym comprised of the factors and indicators to be reported when a soldier witnesses suspicious activity: Size, Activity, Location, Unit, Time and Equipment.  These indicators are to be reported via the iSALUTE website operated by the U.S. Army Intelligence and Security Command accessible at https://www.inscom.army.mil/isalute/ or via phone at 1-800-CALLSPY.  According to a For Official Use Only Operation Order from the 7th Signal Command, as part of the program’s rollout links to the iSALUTE website are to be placed on “every Army web site residing on the NIPR [unclassified] network providing users with the ability to expeditiously report questionable activities to CI [counterintelligence] authorities.”

The Army’s iSALUTE program follows a recent trend of municipalities around the country that have created websites and other programs encouraging citizens to report suspicious activity.  Within the last month, Washington D.C. and Houston have both created websites with support from the Department of Homeland Security that are designed to facilitate suspicious activity reporting.  Both websites are part of a national program known as iWatch, with affiliates in other cities such as Los Angeles and Baltimore.  The Army’s iSALUTE program is different in that it encourages not simply the reporting of threats relating to foreign sources and potential terrorist acts, but it also so-called “insider threats” posed by soldiers themselves.

Though “insider threats” could include genuine terrorist acts, such as those perpetrated by Major Nidal Hasan when he opened fire at Fort Hood in Texas killing thirteen people, the particular focus of the iSALUTE program seems to be on intelligence threats.  While descriptions of the program say that it “focuses on foreign threats to DoD and the Army from espionage activities, terrorist threats, and the insider threat”, information reported through iSALUTE is referred to the Army Counterintelligence Coordinating Authority (ACICA) and not to the primary authorities responsible for the safety of military bases or personnel.  In fact, the iSALUTE program is described primarily as a counterintelligence program.  The Operations Order announcing the program states that “Successful counterintelligence (CI) operations depend on accurate and timely reporting of questionable activities to Army counterintelligence” and “ISALUTE is an online counterintelligence (CI) reporting portal designed to complement other Army threat awareness and reporting initiatives and foster partnerships with the CI, law enforcement organizations, and Army communities.”  Bradley Manning presents an obvious example of an insider threat that would be one of the main targets of the program.  Manning is listed in training materials produced by the Army Threat Awareness Reporting Program (TARP) as an insider threat under the heading “espionage” and “sedition.”  This emphasis is further demonstrated by a poster promoting the iSALUTE program which lists “unauthorized attempts to access classified or sensitive data” as the first item on a list of suspicious activities to report, above even “advocacy for terrorist organizations” and “recruitment by extremist groups.”

An example of the iSALUTE logo and link to be displayed on Army NIPR sites can be seen at the bottom of the U.S. Army Cyber Command’s website.  The main iSALUTE reporting form can be viewed at https://www.inscom.army.mil/isalute/.  To download the following Operations Order on the public rollout of iSALUTE, see OPERATION ORDER 11-206, 7th Signal Command (T) rollout of the I SALUTE (Counter Intelligence Reporting Portal) link into all official Army websites.
----------------------------------------------------------------------------------
RELATED:
iWatch Suspicious Activity Report Generates 1500 Tips (on your fellow citizens)
http://www.nationalterroralert.com/2009/08/19/iwatch-suspicious-activity-report-generates-1500-tips/

f this is your first time visiting National Terror Alert you may want to subscribe to our RSS feed. The National terror Alert feed features breaking news, alerts and bulletins on demand and it's free of charge..
You will only see this message on your first visit to the site. Thanks for visiting!


 

Los Angeles police say they have received over 1,500 reports in the past several months through a new program that investigates possible terrorist related activities or other crimes. Police say several of the reports have led to investigations but they declined to elaborate.

From  the LAPD  iWatch Website

REPORT SUSPICIOUS ACTIVITY –A simple observation, a single phone call or report, can lead to actions that can stop a terrorist attack. Think about the power of that, the power of iWATCH.

Website

Related Articles

iWatch lets public report suspicious behavior (abclocal.go.com)
LA police expand iWatch terror program to airport (seattletimes.nwsource.com)
LA police expand iWatch terror program to airport (sfgate.com)


The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
The Promise of Persistent Surveillance:

The Promise of Persistent Surveillance:  What are the Implications for the Common Operating Picture?
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA436140

SCHOOL OF ADVANCED MILITARY STUDIES

Persistent Surveillance integrates the human component and various technologies and
processes across formerly stove piped domains.  It is not a permanent stare from space or from
airborne imagery platforms.  In essence, the targeted entity will be unable to move, hide, disperse,
deceive, or otherwise break contact with the focused intelligence system.

Once achieved, “persistent” ISR coverage will, in theory, deny the adversary sanctuary, enabling coherent
decision-making and action, to include rapid combat operations, with reduced risk to friendly
forces.

SO, WHO ARE THESE PEOPLE'S ENEMIES?
According to THEM...pg 56
"We become the "irregular" force in the protracted Global War on Extremists and move increasingly to preventative and preemptive actions. "

Now, how do THEY define 'extremists'? ... and, exactly What are THEIR actions going to be?

The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The Promise of Persistent Surveillance:

The Promise of Persistent Surveillance:  What are the Implications for the Common Operating Picture?
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA436140

SCHOOL OF ADVANCED MILITARY STUDIES

Persistent Surveillance integrates the human component and various technologies and
processes across formerly stove piped domains.  It is not a permanent stare from space or from
airborne imagery platforms.  In essence, the targeted entity will be unable to move, hide, disperse,
deceive, or otherwise break contact with the focused intelligence system.

Once achieved, “persistent” ISR coverage will, in theory, deny the adversary sanctuary, enabling coherent
decision-making and action, to include rapid combat operations, with reduced risk to friendly
forces.


“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase.

It will soon be possible to assert almost continuous surveillance over every citizen

and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”

https://www.mega.nu/ampp/privacy.html
-Zbigniew Brzezinski


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
Let's highlight and underscore the most important bits from that article posted above -

Done by machines
Quote
An important characteristic of the new surveillance is that it relies on a machine based, automated collection of personal information. Even the most innocuous transactions leave data trail that can be stored for later analysis(Gandy,2002; Marx, 2004). To some extent, the development of interactive media (e.g., the Internet, digital cable), which allow for a two-way flow of information between the content provider and the consumer, has added to the impetus for continuous tracking of individuals’ behavior and creating profiles that can be used to categorize them into homogenous segments(Baruh,2004;Turow,2005b).

Dehumanization of the 'intelligence'/'data'
Quote
As Gary Marx (2004) argues, the new surveillance does not target suspected individuals. It is carried out superficially, with an intention to closely investigate later. As such, surveillance systems that rely on automated data mining are akin to a fishing expedition that starts by comparing each data-point to the population base. This comparison, done without human interpretation or prior hypotheses about what constitutes risk, has the potential to signal any deviation as risk, which could then invite further scrutiny (Andrejevic, 2007)."

Quote
Third, data mining rationalizes surveillance by removing humans from the interpretation process. The dehumanization of the analyses is important:

My note: Dehumanization of the analysis - let's just pause for a minute and realize the full extent of the 'dehumanization' that we are talking about here. Not only the 'people' are dehumanized because they are nothing more than little ants - little numbers - little IDs/entries in this system, but the data ITSELF is dehumanized because all of this information / intelligence gathering is done on behalf of machines - and it's basically stored and archived forever because storage space is now so goddamn cheap - I mean - 40/50 bucks will get you a 1.5 Terabyte harddrive in stores - imagine what government agencies and defense department agencies can buy themselves to serve as storage. So, what enables all of this total information gathering is the fact that storage is cheap. Now, John P. Stenbit already let it be known that the next paradigm shift will be when 'bandwidth' becomes cheap - when bandwidth becomes cheap, then they will become 'asymmetric' in time - meaning total control over time, who said what, when he said this or that, what we can infer from such and such event having occurred in the past, unlimited bandwidth to send whatever data you want to transmit - and so on

Quote
Because it removes the so-called human bias from the interpretation process. As such, when combined with the fact that contemporary data mining relies on quantification of information (a seemingly dispassionate and objective method of interpreting the social world), this dehumanization projects an aura of objectivity, consequently making it even more difficult to challenge its premise (and the findings it provides).

(My note: What they argue here is - who will argue with 'intelligent/smart cameras' watching where you go and keeping tabs on your daily activities? It's just a camera - it's not a real private inspector spying on you - this is just data that we will MAYBE look at if we feel like it or when we need to single you out because for whatever reason you are now a conceivable 'threat.

It's all (purportedly) part of scientific inquiry. So the gist of it is that they're instantly 'dehumanizing' you by surveilling you and they have 'dehumanized' the surveillance itself because it's not a private guy with a camera snooping on you - no - it's an 'intelligent camera' - an 'intelligent sensor' - that 'senses' certain things -  such as movement (motion sensors) - the excuse would be that it isn't actively looking for the person itself - it just keeps tabs on you IN CASE they might need that data/video feed/capture of your movements/actions in the future.

And what this is all leading to - is that this entire 'system of systems' is going to govern and rule itself without human intervention at all being necessary. Machines will tell people what to do - hence even more perfect 'dehumanization'. This is the completion of the Enlightenment philosophy - or rather, insanity) - it's perfectly 'rational' from a scientific perspective, but all the same it doesn't take into account that this way of surveillance is ultimately even less reliable in terms of really estimating (or rather, guesstimating) threats - but I would say that is not even the intent in the first place.


'Chilling effect' of the panopticon'


Quote

That the data collection and interpretation process is automated has important consequences in terms the uncertainty that surround individuals' interaction with contemporary surveillance. Clearly, uncertainty was an important component of the disciplining function of the panopticon. Whereas guards can observe prisoners at any time, prisoners have no way of knowing when they are being observed.

The concept 'chilling effect of surveillance' underlines an important consequence of this uncertainty regarding when one is being monitored. Accordingly, an individual will be less likely to express her controversial opinions in public if she suspected that any behavior she engages in can be recorded (Marx, 1988), or vice versa, individuals may reveal opinions, at times abundantly, as if it should matter to their listeners."

My note: They evidently are fully aware of the psychological effect this kind of surveillance has on the public. But also note how this extends to expressing certain 'controversial opinions' in public - such as '9/11 was an inside job', or 'the H1N1 swine flu was a hoax'. That's why they are lumping everybody in under this broad stigmatizing label 'conspiracy theorist' - that is why the US government has an official page dedicated to 'conspiracy theories' - they basically give you a couple of conversational topics on that site, and they basically tell you - 'if you utter this in public, you deserve to be stigmatized/ridiculed/abused, and so on - because you are spreading MISINFORMATION'. See, there where we go - total control over the 'information flow' - that's what these guys want - so they even want to insert themselves into this debate.

Self-presentation - How people THEMSELVES are being readjusted to the 'panopticon' through social engineering
Quote
The new individual now lives, works, and shops in transparent interiors of buildings with glass facades (for example, Berlin’s parliament with its transparent dome, Richard Meier apartments in New York). In fact, as Sternberg (2001) notes, the new individual now is occupied in a phantasmagoric workplace and is responsible to create a suitable persona to present her “iconographic capabilities” (p. 11). In other words, the labor of the new individual is a labor of self-presentation.

You see folks, this is so far-ranging I don't think many people can wrap their heads around it. Even ARCHITECTURE is in on the agenda -  notice indeed all these 'glass domes', where workers have to be perfectly identifiable at all times by anyone and everyone - everyone has the right to 'know' what this or that person is doing - in the name of cutting down 'slacking off time'.

This has also been tried in schools - these glass domes where teachers and other government bureaucrats/wards of the state had to be perfectly visible by everyone inside the school. When teachers complained about it or pasted something on the windows so that they were no longer visible, all of a sudden the architects went into a frenzy and demanded they remove whatever it was they pasted on their windows, because it was interfering with their 'artists' conception' of how the building ought to look like.

So just remember -when you're at work, sitting in one of these new glass domes where you can be perfectly spied upon by other people, notice YOU are being dehumanized and reshaped to fit inside this panopticon society - without the manager even purposefully being aware of it himself.


Quote
Strangely enough, this labor of self-presentation, which used to be the domain of celebrities such as movie or rock stars, is now a full-time labor for many individuals, who, for example, wear their emotions on their t-shirts or sweatpants that read Milf in Training, Jerk Magnet, Your Boyfriend Wants Me, or Juicy.





Sense and respond supply chain applied to 'mating' - 'partying' - 'women' - 'objects' - 'dating' - whatever you want to term it - wearing emoticons and 'statements of intent and readiness' on your clothing

Quote
In the digital realm, live webcam feeds through which individuals broadcast what transpired in their bedroom can be considered as an example to the trickling down of the act of self-presentation.  And nowadays, the new individual has Facebooks, MySpaces, YouTube—the  proliferated virtual worlds of sociality—where she not only displays but also actualizes intimacies in public.

Why are women soliciting for sex - or indicating on their shirts that they are really itching to get it on with a  random member of the opposite sex (for example - wearing a T-shirt with the text 'MILF in training', or 'Your boyfriend wants me', or 'Juicy')? Why are girls voluntarily putting up webcams in their bedrooms? Why do women advertise their latest breakup or their new boyfriend vis-a-vis Twitter? Because these are all paradigms instilled by social engineers, and because these women are 'trend followers' - they follow the 'trend' - but that does not mean they know what the 'trend' was meant to achieve in the first place - this they are never conscious of. 'Emotions' and 'inner states of mind' are now broadly 'advertised' on one's personal gear, such as their clothes - they are basically applying the 'self-advertising' and 'self-whoring' as practiced by successful actors and applying that to themselves.

And here's even more food for thought - you know, what they are doing here - is applying 'sense and respond' to 'partying' / 'mating' / 'promiscuity'. Really, a girl enters into a club with the sign 'Hey there - I'm such a hot mom that everybody wants to f**k' - and hey - this 'sense' / this 'broadcast' is then sent to the entire 'club' - and then all the 'men' come engage this 'girl' in the engagement grid which is the club - and she gets to choose her pick. SENSE - AND RESPOND.

You know, people, you think this stuff is 'kinky' or 'sexy' - women wearing 'MILF in training' and the like - it gives you a hard-on or whatever when women are advertising their 'readiness' - like some sick 'sense and respond' supply chain loop applied to mating/promiscuity. But notice - this not only further removes 'privacy', it utterly destroys any semblance of keeping 'thoughts to yourself' - because your 'T-shirt' becomes your 'emoticon board' - it becomes some kind of advertising space on which you can express your emotional/sexual state of mind.

BTW, know who first helped bring this meme into existence - 'MILF in training'? Britney Spears. You see - the 'culture industry' 'instigates' these trends - and Britney herself being 'handled' by umpteen managers and so on - I'm not even sure she was even in charge of what she was going to wear that day.

It's a pretty sick state of affairs - everywhere you look, all of this stuff - all of this new 'normalcy' - IT'S ALL PART OF THE GODDAMN PLAN TO PUT EVERYONE INSIDE THE PANOPTICON. And it's going to get worse.


Needless to say, this document/essay is pretty important. To all women out there who are currently walking around with T-shirts such as 'I am horny' or 'MILF in training' or 'Come here rude boy - can you get it up?'  - regain your womanhood - don't fall for the social engineers' purposefully engineered trends so they can acclimatize you even more into giving up all your personal information, your sense of being, your sense of pride, your desires - because this by itself is not the endgame. They want a totally regimented society consisting of 'transhumanist' hordes - with SOA services feeding them whatever it is they need to be thinking of now, at this particular time, based upon his or her's value to society and social status.

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
URBAN SUNRISE
Synthetic Urban Networks and Relationships
Intelligence and Simulation Environment

Available online at:  http://handle.dtic.mil/100.2/ada421528
[NOTE: Original Title: Protecting critical infrastructure in urban areas from YOU, the terrorist
Previously, we covered such subjects as 'social networks' - where the intelligence agencies, the Navy postgraduate school, Harvard, MIT and others were using it as a way to 'profile' you and all your social contacts/daily behavior.

Now, today we are going to go one step further into the bleak heart of the New World Order - you've just gotta ask yourself one question:

* Are these guys crazy/paranoid enough that they want to 'profile' my daily walking routine/behavior?

And the answer is: You betcha. And it's scary as hell - and while they don't talk about Twitter, or Google Wave, or RFID public transport cards, DO CONSIDER that they have all CONSIDERED this beforehand and have integrated into their system.

So the guy who had reservations about Twitter -

Twitter - double edged sword?
http://forum.prisonplanet.com/index.php?topic=157730.msg937046;boardseen#new

Was absolutely right. These guys are 'analyzing' traffic - they are investigating all the different 'routes' that binds groups of people together. Say, you have this shopping centre with a multitude of stores. The New World Order goons want to know - which kinds of people walk into this or that store, which kinds of people don't go to the store at all - which kinds of people stop to look at an advertisement in the shop window?

Computational Science and Its applications - ICCSA 2008 - Part I

Now be forewarned - this book is 1283 (!!!) pages long. It covers everything from iris recognition systems to geospatial data mining to 'profiling' the way you walk. Remember Alex talking about how the face-scanning cameras will use the biometric footprint of your body (that is what they have of you when you walk through the body scanner at the airport) to recognize you by the way you walk? Something similar to that is being discussed right here.

But before we discuss that - let's first talk about these guys using geospatial data to 'secure infrastructure' from the pesky public. Remember Dr Ruth A. David saying in that Homeland Security podcast that 'protecting key infrastructure' was one of Homeland Security's most important tasks - both domestic and abroad? That nexuses in with this.


Geospatial Modelling of Urban Security: A Novel Approach with Virtual 3D City Models


Markus Wolff and Hartmut Asche

University of Potsdam, Department of Geography, Karl-Liebknecht-Strasse 24/25,
14476 Potsdam, Germany
{Markus.Wolff,gislab}@uni-potsdam.de

Abstract.
Complex urban structures are exposed to a variety of security risks.Especially concerning man-made hazards, cities can be considered as particularly vulnerable. Due to their high concentration of population, technical and social infrastructure, as well as their importance in politics, culture, economy and finance, metropolitan areas, in particular, can be considered as vulnerable environments. Since not every part of an urban area is exposed to the same level of potential security threats, it can be assumed that this level differs regionally within a metropolis. Based on methods of geoinformation science, this paper presents an innovative approach to identify particularly vulnerable urban regions. Using the 3D city model of the German capital Berlin as an example, the potential of such models for mapping, analysis and assessment of different threat levels in urban environments is demonstrated. This geovisual and analytical potential of 3D city models can be instrumental for decision makers working in security agencies for both threat assessment and intuitive cartographic communication of spatial phenomena related to urban security issues.

Keywords:
GIS, 3D city models, geovisualisation, civil security.

1 Introduction
This paper presents an approach which couples GIS-based analysis with the visualisation potential of virtual three-dimensional city models. Taking the virtual 3D city model of the German capital Berlin as an example [4], we discuss selected geoanalysis methods targeted at data integration and vulnerability mapping of metropolitan regions. This geoanalytical method is then applied to investigate selected issues in the field of civil security. This approach requires the integration of application-specific thematic information into the databases of existing city models. This is accomplished by using a Geoinformation System (GIS) to manage large, heterogenous spatial data. Virtual representations of complex three-dimensional urban environments are constantly gaining popularity among both the scientific community and the wider public. To cater for these requirements we develop a workflow for extending, analysing, visualising and combining existing 3D city models with related thematic data of special interest within the domain of civil security.


Translation: they're tracking you - and they are determining and gauging whether you are a 'threat' to businesses or key infrastructure. As per Dr Ruth David's own admission, protecting key infrastructure is one of Homeland Security's most important assignments.


This workflow as well as the extension of the database with frequency and sociodemographic data is presented in section 2. Based on these database enhancements an innovative method to map and analyse regions with different degrees of exposure is presented in section 3. It is shown, that investigating urban environments for increased security risks reveals an uneven distribution of threat levels over metropolitan space. Thus different urban regions can be characterised by different levels of exposure, resistance and resilience compared to possible security threats. The end result is different levels and spatial distributions of vulnerability. In this context a GIS-based tool is presented which allows for an automated processing the input data and thus facilitates an easy repeatability of the analyses. Section 4 finally contains a short summary and introduces some perspectives.

2 Augmenting Existing Geodatabases for Geovisual Analysis
Three-dimensional city models are more and more available, with various cities possessing their own digital 3D representations. Compared to the traditional medium for communication of geographical data – the two-dimensional map – virtual three-dimensional city models facilitate in-depth analysis and presentation of spatial data. Furthermore, from a cartographic point of view, three-dimensional geovisualisation can reveal “patterns that are not necessarily visible when traditional map display methods” [9] are used. Applying methods and functions of visual analytics facilitates to “detect the expected and discover the unexpected” [11] as by means of visual data mining [5]. Thus, complex spatial situations like planning scenarios, noise and pollutant dispersal patterns are increasingly analysed and visualised by the use of 3D city models [3].

Typical datasets included in such databases contain, e.g., cadastral and topographic information as well as information relating to buildings, such as use or function, dimensions, height, etc. What is, however, widely lacking with these databases is application-specific thematic content linked to the different topographic and 3D data layers. To augment existing city model databases with thematic information required to conduct special-purpose geoanalysis in the field of civil security a workflow is developed to perform such operations in a systematic way (cf. figure 1). Within this workflow we use different methods of GIS-based analysis to extend the database. As an example, passenger-frequency information (cf. section 2.1) is added by linking this data to road segments. The GI-system database then provides the basis for further analysis and allows to generate different types of visualisations. Conceptually speaking, GIS serves as the centre for non-graphic data analysis. The 3D geovisualisation system serves as the visualisation front end, facilitating graphical analyses by interpreting spatial relationships in a three-dimensional environment. Applicationwise we use a commercial GIS package, namely Esri ArcGIS, and the LandXplorer 3D visualisation software system [6].

To investigate the geoanalytical potential of this combined GIS/VIS system, it has been applied to model urban risks in the centre of the German capital Berlin. The study area covers a 13 km by 6 km strip of the city centre inside the inner metropolitan train ring between Westkreuz and Ostkreuz S-Bahn stations. This transect contains the “Western Centre” (Kurfuerstendamm boulevard) of the city as well as its “Eastern Centre” (Alexanderplatz Square).


As a database we have used the official Berlin city model which includes the following data sets:

• Built-up area of 57,096 buildings, with height data and building function
• Street network, compiled primary for car navigation issues (from Teleatlas)
• Public transport network: Metropolitan train (S-Bahn), underground, tram and bus routes
• Geotopographic data, namely topographic map K5 (scale 1:5,000), digital terrain model (resolution 25m), high resolution aerial photography (HRSC, resolution 20cm)

2.1 Modelling Outdoor Bustle: Enhancing the Building Dataset with Frequency Information

An important factor in analysis of security related issues is detailed information on the activity flows within a city. With this information, areas, streets and single buildings in a city model can be identified which are daily frequented by many or few people. This kind of information is to date not included in the Berlin city model database. That is why data from the FAW Frequency Atlas of the German Association for Outdoor Advertising (FAW) are integrated into the 3D city model database. This atlas, originally developed for the advertising industry, has been compiled also for the city of Berlin and is based on Teleatlas road segments. The atlas data allow for an in-depth evaluation of pedestrian, car, and public transport frequencies. Frequencies are calculated as average values per hour on a working day basis for the years 1999 to 2005 [7]. Technically speaking, for each road segment one FAW point exists with the corresponding frequency values. Based on its geocoded coordinates this dataset is imported into the existing Berlin city model. This point-based FAW information is then referred to the corresponding road segments via its unique segment-ID. By this each segment of the street network dataset is supplemented by new attributes: The number of pedestrians, cars and public transport carrier that frequent any given street segment per hour of an average working day (cf. figure 2).


Note what they are doing here - they admit they are treating the entire CITY as a 'network' with 'activity flows' - which means they're treating you as a data packet inside a network. Yes, that's kind of a lame analogy, but it holds true when you see the picture below and you see the streams with the alternate colours - they show you the frequency of people walking on a daily basis in this or that street. Juxtapose all that with the cameras that also determine how many people are frequenting this or that road or area (and I have an official RFID book by the way that confirms that - I'll pull it up later to confirm this to you lot) - and this is surveillance on a far greater scale than anything ever imagined in George Orwell's 1984. This is why they need all those sensors inside the cities - predictive modeling of the pedestrians' behavior so that they can 'protect' key infrastructure - which is the police/law enforcement's chief focus today. THEY ARE NO LONGER ABOUT PROTECTING CITIZENS - I HAVE HAD THIS VALIDATED BY SEVERAL COPS WHO TOLD THIS SHIT RIGHT IN FRONT OF MY FACE.


In addition to frequency data referred to street segments similar information for buildings along streets can be relevant for civil security issues which are often relating to single potentially vulnerable buildings (My note: See? Protecting critical infrastructure - this is what the militarized/joint combat police are for in conjunction with Homeland Security. Remember Dr Ruth David in that Homeland Security broadcast saying Homeland Security's prime directive was protecting key infrastructure and the 'away game' (as in: operating overseas) was most important? That's what this is). For that purpose frequency values have been assigned to adjacent buildings by analysing distances from buildings to street segments (cf. figure 3). First, centroids of each building are calculated. Second, new points are created along the road segments for every 30 meters. Third, the four nearest segment points, based on each centroid, are identified. Finally, an average value is calculated from their frequency values which is assigned to the whole building. As a result, such “smart” buildings can be queried for their frequency data.




See? They're not just tracking the traffic flows of the cars and other automobiles using GIS - no, they're also recording and profiling the traffic flows of PEDESTRIANS - meaning, when you walk on the goddamn street for no particular reason other than to go shopping, get drunk or visit your significant other.

2.2 Modelling Building-Related Population Parameters: Augmenting the Building Dataset with Socio-demographic Data

To identify and analyse potentially vulnerable city regions additional socio-demographic data on a building block basis is required. Such data are, e.g., population density, family income or purchasing power. Knowledge of these patterns enables one to draw conclusions from exposure, resistance and resilience concerning a possible hazardous event. To map vulnerability patterns within an urban region, additional population data of the German Society for consumer research (GfK) are also integrated into the existing city model database. Here such data are only available for the central Berlin postal code zones 10115 and 10117, respectively. This is an area of 6 km² stretching from Brandenburg Gate in the west to Hackescher Market in the east, Bundesrat building in the south and Schwarzkopfstrasse underground station in the north.

This area is both suitable and interesting for security related analysis since numerous embassies, consulates and government buildings, as well as highly frequented touristic sites, such as Friedrichstrasse street, Unter den Linden boulevard, Gendarmenmarkt square, are located here. In addition, this area will house from 2011 the new headquarters of the German intelligence service (Bundesnachrichtendienst, BND) which will be located on the former World Youth Stadium (Stadion der Weltjugend) site.

As with processing of FAW frequency data, GfK data are imported using GIS functions. The available source dataset of 2006 includes numerous socio-demographic features such as population data, household size, household net income, building structure, building use, purchasing power. For data privacy reasons data are, however, not available for single buildings but for all buildings along a given street segment (My note: Oh, gee, thank goodness - they just 'profile' whether or not I fit inside some kind of poor or lower social class that is likely to pose a 'problem' for them - and hey, they can always extrapolate from that my household size and net income even though they basically deny here they have that capability.). Spatial reference of these point based data is by coordinates. Reference of those points to the appropriate buildings is verified by the matching of street names of GfK data points and belonging buildings, respectively. Therefore an algorithm is applied which searches for each building (its centroid) the nearest GfK point with the same street name. Attributes of this point are transferred to the building. Figure 4 is a 3D visualisation showing purchasing power related to each building block.


BTW - just as a side note - I thought that liberals were so fond of saying there are no longer any social classes or differences in social class? Well, this does seem to fly in the face of that - since they're giving certain residential zones 'certain colors' on the basis of their income status/purchasing power, and household size - and they 'infer' from that how likely you are a threat to 'key infrastructure'.




3 Geospatial Modelling of Urban Risks

The augmented 3D city model database is a prerequisite for further and in-depth geoanalysis of urban risks. The broad range of thematic data integrated into the database allows, e.g., for further spatial analysis in the context of an urban impact assessment. Such analysis will, however, not produce any precise indication which building (the element-at-risk, EAR), e.g., is exposed to an increased threat of what nature. For such evaluation of factual threat levels, a substantial amount of additional data would be required, many of which are not available publicly. In this context Koonce et al. [8] state that this knowledge is "best left to the security and intelligence agencies". In this study it is therefore assumed that only buildings with specific occupancies, such as government offices, or embassies, are particularly vulnerable to security threats.


OK, and what conclusion are we to draw from that? That the 'intelligence agencies' are monitoring and building maps of my entire residential area looking for threats to THEIR 'key infrastructures'? I thought the terrorists were over there, so we didn't have to fight them over here - why am I the threat? Oh why even entertain cognitive dissonance, we know how this game is being played.


Dealing with the nature and location of potentially hazardous events in urban environments [2, 10], an evaluation of the surroundings of a particular building exposed to a given risk is of special importance. Thus, for protection as well as for counteractive measures it is decisive to differentiate whether the structure is surrounded by open space or by dense urban housing. To perform such distance based analysis on the city model built-up area layers, a first step requires the creation of circular impact zones, with the element at risk in its centre. In our case the radii are defined at 150m, 300m, 500m, 1,000m and 2000m intervals. In a second step the intersections of impact zones and buildings allow for statistical analysis based on the built-up-area database. This analysis shows that buildings within zones one to three (up to 500 m from the EAR) are passed by an average of 200 pedestrians. This value is decreasing with increasing distance. Because of the EAR location in a business district of central Berlin, the greater the distance from the EAR the more buildings have residential instead of business and administrative occupancies. As a consequence the number of potentially affected pedestrians is decreasing while the number of residents is increasing (cf. figure 5).



3.1 Modelling the Distribution of Exposure Levels in Urban Environments

In the following an approach is presented to identify urban regions characterised by different degrees of exposure of a potential impact. The underlying assumption of this investigation is that not every area of an urban environment is equally exposed to the same level of potential threat. Rather a regional variation of threat levels can be found, as buildings potentially exposed to an increased security risk are not evenly distributed in city space. In this study the term "highly increased" threat is assumed for buildings housing embassies, consulates and government offices. An "increased" threat is assumed for the following buildings: Shopping centres, petrol stations (danger of explosion), police posts, power or transformer stations (critical infrastructure) etc. The following analysis is based on the buildings dataset of these categories (=exposed buildings). It can, however, be expanded to any user-defined set of buildings within a city model.

To map regionally different exposure levels the city model is first overlaid with a user-defined grid. Second, the distance of each grid cell to the closest exposed building is calculated. The resulting grid pattern is composed of cells each of which contains one distance value of the respectively closest exposed building. The grid can be further differentiated by building occupancy. The embassy grid, e.g., contains distance cell values of the closest buildings used as embassies or consulate offices. This set of exposure grids generated by proximity analysis forms the basis to identify different levels of threat exposure. For that purpose, each function-specific grid is reclassified in relation to proximity: Thus, grid cells closer to an exposed building are assigned a higher exposure level than cells with greater distance (cf. tab.1).



GIS-based grid analysis, as used here, allows for convenient overlays and combinations of areal data by using map algebra functions. Hence all function-specific exposure grids generated are combined into one single “exposure grid” by summation of their respective pixel values. It has been mentioned that different building uses can be assigned different levels of threat exposure. Thus summation is performed by weighting the respective grids according to their threat exposure: The embassy offices grid (embassies, consulates) and the government offices grid are weighted with a factor of 4, the shopping centre grid with a factor of 2 and the service and utilities grid (police posts, petrol stations, power stations) with a factor of 1 (figure 6).

The workflow described here has been automated by developing a GIS tool using ESRIs ArcObjects based software development framework. Our tool facilitates an automated and fast processing of the single grids (figure 7).







To employ this tool a buildings dataset containing information on building use and functions, respectively, is mandatory. The current version requires the user has to create an ASCII remap table according to table 1.

The combined weighted exposure grid can be visualised in different user-centered ways for further geoanalytical processing. Presented here is a 3D visualisation of a virtual threat surface based on the Berlin city digital terrain model (cf. figure 8). For easy comprehension exposure grid values are exaggerated by a height factor of 10 and added to the original height values of the digital terrain model. The resulting 3D map is a graphic, easy-to-read visualisation of the spatial distribution of threats in urban environments.

Intersection of the summation exposure grid with the buildings layer results in additional threat information in the built-up area dataset. As this dataset has also been augmented by socio-demographic data, a variety of geographical correlations of building occupancy, socio-demographic situation, infrastructure etc. with regional threat exposure can be mapped, visualised and analysed. For instance, all buildings located within grid cells with values of combined exposure levels greater than a given value can be selected. Also statistical analyses can be performed to distinguish between spatially varied socio-demographic feature states. As a result, it is feasible to map those regions characterised by a number of inhabitants above average, significant purchasing power and high financial status (derived from net income per household)
.


So, what conclusion am I supposed to draw from this? That the Census Bureau is out of a job? (or not, depending on who you think is going to be running this system) Can we let machines run this thing - possibly employing a neural network or a 'world brain' for a particular city segment? Do machines start analyzing sociodemographic data and basing their agenda on it?


4 Summary
This paper presents an approach to combine GIS-based spatial analysis with innovative 3D visualisations using virtual three-dimensional city models for applications in civil security. Based on augmenting the existing spatial database of the virtual 3D city model of the German capital Berlin by a variety of parameters including building occupancy, frequency values and socio-demographic parameters, areas and objects exposed to specific levels of threat can be identified By combining function-specific grids with threat exposure levels the spatial distribution of threat levels can be mapped. The resulting geographic distribution can subsequently be combined with additional socio-demographic or infrastructure data for further geovisual analysis. (My note: So, what they have here is a realtime virtual environment MODELLED on the actual environment that basically includes you, your entire residential block, the income and purchasing power of your residential block, and all of this with the specific intent and purpose to profile whether or not you will EVENTUALLY pose a threat to 'key infrastructure' and the government. What this is, is SimCity for psychopaths - SimCity for control freaks - they are running here a color-coded version of SimCity that is modelled on the real-world. This is the kind of depersonalization that enabled the Nazi death camps - reducing men with real lives, with real emotions, with real feelings to mere statistics and engraved dots inside some Hollerith supercomputer which is continuously fed punch cards) Perspectively some of the presented methods and functions will be modified: The ArcObjects tool presented in section 3.2 will be extended to a larger ArcMap plug-in which also allows for an automated processing of the GIS features for the 3DLandXplorer System. Furthermore the presented approach of modelling and analysing
urban security by using GIS and 3D city models will be broadened by introducing some standards of thematic 3D cartography. Thus, an efficient communication of spatial phenomena shall be ensured.

Acknowledgements
Funding of this study by the German Federal Ministry of Education and Research (BMBF) within the framework of the InnoProfile research group ‘3D Geoinformation’ (www.3dgi.de) is gratefully acknowledged. The authors also like to thank the German Association for Outdoor Advertising (FAW) for providing frequency atlas data and Berlin Partner GmbH for use of the official Berlin 3D city model.

References

1. Borst, D., Jung, D., Murshed, S.M., Werner, U.: Development of a methodology to assess man-made risks in Germany. Natural Hazards and Earth Sciences 6, 779–802 (2006)
2. Coaffee, J.: Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape, Gateshead, Ashgate Publishing, Ltd. (2003)
3. Czerwinski, A., Kolbe, T.H., Plümer, L., Stöcker-Meier, E.: Spatial data infrastructure techniques for flexible noise mapping strategies. In: Tochtermann, K., Scharl, A. (eds.)
20th International Conference on Environmental Informatics - Managing Environmental Knowledge, Graz, pp. 99–106 (2006)
4. Döllner, J., Kolbe, T.H., Liecke, F., Sgouros, T., Teichmann, K.: The Virtual 3D City Model of Berlin - Managing, Integrating and Communicating Complex Urban Information.
In: 25th Urban Data Management Symposium, Aalborg, Denmark, 9.73–79.86 (2006)
5. Döllner, J., Baumann, K., Buchholz, H.: Virtual 3D City Models as Foundation of Complex Urban Information Spaces. In: Schrenk, M. (ed.) CORP, Vienna (2006)
6. Döllner, J., Baumann, K., Kersting, O.: LandExplorer – Ein System für interaktive 3DKarten.
Kartographische Schriften 7, 67–76 (2003)
7. Fachverband für Außenwerbewirtschaft, FAW-Frequency-Atlas, Data description (2006)
8. Koonce, A.M., Apostolakis, G.E., Cook, B.K.: Bulk Power Grid Risk Analysis: Ranking Infrastructure Elements According to their Risk Significance, In: Working Paper Series, Massachusetts Institute of Technology, 39 pgs (2006)
9. Kraak, M.J.: Geovisualization illustrated. ISPRS Journal of Photogrammetry and Remote Sensing 57, 390–399 (2003)
10. Mitchell, J.K.: Urban Vulnerability to Terrorsim as a Hazard. In: Cutter, S.L., Richardson, D.B., Wilbanks, T.J. (eds.) The Geographical Dimensions of Terrorism, pp. 17–25.
Routledge, London (2003)
11. Thomas, J.J., Cook, K.A.: Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society, Los Alametos (2005)



BTW - know what they did here?

They've just applied the DHS original color-coded threat assessment system onto the entire world map - they've 'color coded' entire residential zones according to the threat they pose to DHS' to-be-protected key infrastructure, and on top of that they can also pull in all of the sociodemographic data that is also going into this system - they can see if you're living inside a residential area with relatively low household income, they can probably infer from that the racial or ethnic makeup, and so on.

This is the kind of stuff that enabled the Nazi concentration camps - because what they do is, they de-personify you and entire classes of people - and turn it into a number, a statistic, a binary floating inside some computer system. How 'convenient' that the concentration camps were all enabled by IBM Hollerith supercomputers with punch card index systems used to compile much of the sociodemographic and racial makeup that the Nazis desired.

It could 'never happen again', eh? Combine this system with the Global Information Grid, with Interpol's DNA databank and it absolutely DWARFS anything the Nazis ever came up with - it's full spectrum dominance of everything inside the public and private sector.



Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
NORTHCOM USE OF 'PSYOP FORCES' (Obviously working with FEMA) DURING CIVIL OPERATIONS ... and much, much more.

MOST LIKELY IMPLEMENTED DURING HURRICANE KATRINA.
---------------------------------------------------------------
http://www.hsdl.org/?view&did=472840

UNCLASSIFIED
 
                                                         HEADQUARTERS, US NORTHERN COMMAND
 Peterson AFB, CO 80914-3270
11 April 2006
 
TAB D TO APPENDIX 3 TO ANNEX C TO CONPLAN 2501-05
PSYCH  
INFOR
 
 250 Vandenberg Street, Suite B016
OLOGICAL OPERATIONS (PSYOP) SUPPORT TO CIVIL AUTHORITIES
MATION SUPPORT ELEMENT (CAISE)  


Referen ublic Information, 30 April 1999  
986  
nt
8, 13 July 1998, Cooperation Agreement for Policy
Coordination between the United States Information Agency and the
ent of Defense (1997)  
 
d
  
1.  Situ
ces:  a.  PDD 68, International P
 
b.  DOD Directive S-3321.1, Overt Psychological Operations Conducted in
Peacetime and in Contingencies Short of Declared War, 26 July 1
 
c.  CJCSI 3110.05A, Joint Psychological Operations Supplement to the Joi
Strategic Capabilities Plan FY 1998, 15 June 1999  
 
d.  MCM-163-9
Departm
e.  Hurricane Andrew Lessons Learned, 24 August 1992, DOD Protection
Lesson Learne
ation
 
a. Overview.  Refer to Appendix 3 to Annex C, Information Operations (IO). Based
on
cap ivil authorities.  In these types of
events, PYSOP forces and capabilities can assist by conducting area assessments,
eva
pop ort for
req  small footprint while being a
force multiplier to the first responders as a part of CDRUSNORTHCOM’s response
pport
n
horities only.   The use of PSYOP
orces in the support of DSCA operations will require separate
POTUS/SECDEF approval. PSYOP forces and capabilities will be used to inform
ion approved by Civil Authorities. PSYOP capabilities that
ould be used for DSCA operations include Commando Solo, Mobile Radio
Bro on,
Are bilities and
for
rela
eve
previous operational employment for DSCA events, PSYOP forces and
abilities can be used in a supporting role to the c
cuation operations, general assistance, information dissemination, support to
ulace/resource control, military civic action, emergency services and supp
uesting civil authorities.  PSYOP forces create a
in support of civil authority requirements. PSYOP capabilities and forces can su
the Civil Authority in the dissemination of life-saving messages and informatio
produced and approved by the Civil Aut
capabilities and f
U.S. persons with informat
c
adcasting systems, entire family of loudspeakers, Face to Face communicati
a Assessments, Print and Media production sections.  PSYOP capa
ces must be responsive to the varied levels of accessibility to key audiences
tive to the scope and requirements in order to maximize their utility for DSCA
events.

b.  US Perspective.  Refer to Base Plan and Annex C, Operations for US Perspe
DSCA operations.
 
(1) Augmenting Organizations.  US Special Operations Command (USSOCOM).  
 
(2) Legal Situation
ctive
on
 
.  To be promulgated as necessary by USNORTHCOM JA
based on the situation and scope. USNORTHCOM PSYOP capabilities an
for DSCA will adhere to all regulations, policy and laws concerning the use o
PSYOP capabilities and forces.
 
d forces
f
c.  Neutral Perspective.  Non-influence PSYOP capabilities, in a supporting role
used in DSCA operations to assist civil authorities by conducting area
essments, evacuation operations, general
, can
be
ass assistance, information dissemination,
support to populace/resource control, military civic action, emergency services and
sup
foo
CD
 
d.  Assumptions
port to the civil authorities. Non-influence PSYOP forces can create a small
tprint while being a force multiplier to the first responders and
RUSNORTHCOM.
 
 
will provide all information for PSYOP development and
approve all information and messages prior to dissemination.
 
(3) tify, advise, and coordinate the use of PSYOP
forces and capabilities with Civil Authorities.  
 
(4)  Civil Authorities will be provided a PSYOP capabilities planner deployed by
USNORTHCOM request in conjunction with the
DCO/DCE deployment for DSCA operations.
 
2.  Mission
(1)  USNORTHCOM will not conduct PSYOP within CONUS unless approved
SecDef or POTUS.
 
(2)  Civil Authorities
  USNORTHCOM will iden
USSOCOM upon CDR
.  USNORTHCOM plans, coordinates and employs PSYOP forces and
 to develop and disseminate critical information for DSCA operations.
on          
capabilities
      
3.  Execution  
concept of Operations a.    
Employment (1) .  PSYOP forces and capabilities in DSCA operations will
port Civil Authorities with criticasup l information dissemination.
USNORTHCOM will plan, coordinate, and synchronize PSYOP capabilities and
forces in preparation for and in support of DSCA operations. PSYOP forces and
capabilities in support of DSCA will be coordinated and synchronized by phases to maxi
operati
PSYOP
support l
establis
to addr
USNOR
Author
Author ith these
capabilities in adverse conditions to the necessary populations.
 
(2) Pha
mize effects of dissemination in designated locations within the joint
ons area (JOA). During all phases of the operation the objective for
 force and capability use is to disseminate critical information that
s the civil authorities and their desired end state. USNORTHCOM wil
h a strategy of engagement with SecDef and USSOCOM (force provider),
ess a deliberate, long-term approach for use of these forces.  
THCOM will also engage in educating and coordinating with Civil
ities on the use of PSYOP capabilities for DSCA operations. Civil
ities will be able to communicate their critical information w
ses.  USNORTHCOM conducts DSCA in five (5) phases: Phase
g; Phase II – Staging; Phase III – Deployment; Phase IV – Support of CI – Shapin ivil
Authorities; and, Phase V - Transition.  
 
(3) Themes to stress.  These themes will be approved and promulgated by the
thority or the JTF CDR’s.  PScivil au YOP forces may suggest themes to stress to
the civil authority, which have been used in similar operations, but will not create
or appr
 
(4) The
ove themes.  
mes to avoid.  Any themes, which are not approved and promulgate
thorities or the JTF CDR’s, will not be used or disseminated by PSYOP d by civil au
capabilities or forces for DSCA operations.
 
(5) PSYOP Actions  
 
(a)  Guidance for the use of PSYOP capabilities in support of Civil
Aut
 
(b)
 
(6) Operational Tasks
hority’s requirements.
 Guidance for avoiding military operations.
 
 
(a)  Phase I:  This phase is continuous situational awareness and prepared
s.  It involves planning, interagency coordination, preparations, exe
 situational awareness of events occurring in the area of operations.  For
shaping phase, USNO
nes rcises,
and
the RTHCOM will coordinate with civil authorities on
the utility of capabilities.  USNORTHCOM will also coordinate within DOD
ese capabilities seeking approval ultimately by SecDef.  Due to
xtreme lead time for proper deployment and execution of theses capabilities ,
US
cap ble,
to s
  
(b)  Phase II
on the use of th
e
NORTHCOM anticipates, if requested, that the full range of PSYOP
abilities and forces will be deployed to the full maximum extent possi
upport the civil authorities.  
 
  
1.  Phase II begins with the identification of a potential DSCA mission
when directed by SecDef.   Due to the nature of DSCA operatio
impact of PSYOP capabilities and assets (and in accordance with the
plan guidance on deployment(Phase III)), PSYOP assets might begin
deploying in this phase, which will require SecDef approval. One po
deployment during this phase is the PSYOP capabilities planner prov
to civil authoriti
, or
ns and
base
ssible
ided
es and an assessment team which must assess and
oordinate the operation as soon as critical information dissemination c
requirements are considered as a part of DSCA operations.
 
2.  USNORTHCOM will deploy a PSYOP planner in conjunction with the
eploying DCO/DCE to the Joint Field Office (JFO) to develop d
information dissemination requirements that are and will be needed.  
 
3.  The PSYOP Planner will coordinate with USSOCOM and
SNORTHCOM to ensure that the full spectrum of PSYOP capabilities U
and forces will be available.
 
4.  The USSOCOM PSYOP planner will coordinate an approval process
for DSCA operations with ultimate product approval by designated Civil
Authority. Civil Authority, with USNORTHCOM assistance, will
coordinate product and information dissemination missions that support
Civil Authority objectives.
 
5. USSOCOM and USNORTHCOM will monitor and assess the
effectiveness of these operations.
 
6.  USNORTHCOM through coordination with Civil Authorities and
USSOCOM PSYOP planner, will determine the triggers for requesting
PSYOP capabilities and forces, and the appropriate force structure to
support these requirements.
 the
 
7.  Success is defined as: (1) forces deployed, PSYOP liaison with the
Civil Authorities is established; (2) approval process/chain is established
based on civil authority’s requirements and direction; and (3) pre-
approved overarching messages and products are established and approved
by civil authorities.
 
c)  Phase III
 
(  
 
1.  USNORTHCOM J39 will coordinate with the PSYOP Planner, civi
authority public information officer (PIO), JTF CDR and JTF PA to
develop the approval process/chain with civil authorities for the
dissemination of civilian approved information and messages.  
 
l
2.  The PSYOP Planner at the civil authority will coordinate with the
DCO/DCE, JTF CDR, and JTF PSYOP Planner to develop the
requirements for employment of  PSYOP capabilities and forces for
DSCA operations. Civil authority PIO and PSYOP Planner will determine
the location for the PSYOP Product Development Section to ensure
mely product  development, approval, production and
dissemination.
3
efficient and ti
 
.  The PSYOP LNO will coordinate the receipt and logistical support of
apabilities with the Civil Authority PIO, DCO/DCE,
JTF CDR, JTF PSYOP Planner, and JTF PAO.  
4
PSYOP forces and c
 
.  The PSYOP LNO will ensure that the approved approval chain and the
nd messages are available to the deploying PSYOP
commander in the JTF AO.
5
approved themes a
 
.  The deploying PSYOP unit commander will coordinate with the JTF
nner and JTF CDR to ensure that PSYOP capabilities and
forces are integrated into their supporting units.  The deploying PSYOP
e
PSYOP Pla
unit commander will ensure communications are established between th
civil authority PSYOP LNO, commander of Product Development
Section, the JTF PSYOP Planner and subordinate PSYOP Detachments
commanders.
 
6.  The deploying PSYOP unit commander will ensure that support of the
supporting units is established to provide long term support to the civil  
authority.  The deploying PSYOP commander, PSYOP LNO, JTF PSYOP
will ensure that themes and messages are only approved by
civilian authorities. The deploying PSYOP unit commander will submit a Planner
daily SITREP, Product Dissemination Matrix and all visual copies of
products to USSOCOM and USNORTHCOM J39.
 
(d)  Phase IV:  Civil Authority, USNORTHCOM, the PSYOP LNO, JTF
PSYOP Planner, and PSYOP unit commanders will coordinate to conclude
etermine the appropriate force structure to support the transfer
s to civil authorities.  During this phase, USNORTHCOM
 to
hase V
operations and d
of responsibilitie
objectives and effects are achieved and the civilian authorities can begin
execute long term recovery plans.  Redeploy phase will begin at this time.
 
(e)  P :  The PSYOP LNO (to civil authority) will provide an After
essons learned to the civil authority, DCO/DCE,
, USSOCOM and the JTF PSYOP Planner within 48
, USNORTHCOM J39, USSOCOM and the PSYOP LNO (to civil
authority) with-in 48 hour of redeployment or end of mission.  The deploying
Actions Report with l
USNORTHCOM J39
hour of redeployment or end of mission.  The JTF PSYOP Planner will
provide an After Action Report with lessons learned to the civil authority,
DCO/DCE
eport with lessons
arned to the civil authority, DCO/DCE, USNORTHCOM J39, USSOCOM
r end of
ission.
PSYOP unit commander will provide an After Actions R
le
and the JTF PSYOP Planner within 48 hour of redeployment o
m
  
(7)  Specified Tasks  
(a)  USNORTHCOM . TBD
(b)  USSOCOM . TBD
 
(c)  JSOC. TBD
 
4.  Administration and Logistics
 
a. Logistics  
 
(1)  See Annex D.
 
(2)  Army Special Operations Forces (SOF) (ARSOF) unique PSYOP support
requirements are arranged for through USSOCOM logistic channels.  Army
common supply, maintenance and facilities support is provided or arranged
through standard Army logistic channels.
 
(3)  Re-supply of PSYOP-peculiar equipment will be accomplished through US
Army Special Operations Command supply channels (SOF specific re-supply).
 
b.  Administration
 
(1)   Requirements for special reports.  During all phases of the operation, all
component commands/TF’s conducting PSYOP capabilities  will submit a daily
Psychological Operations Report (PSYREP) through the JSOC to
USNORTHCOM/J3/J5 that include copies of any approved civil authority critical
information products.
. Command and Control 5  
 
a.  USNORTHCOM will coordinate with Civil Authority Information Support
Element (CAISE) from USSOCOM for planning and execution of PSYOP capability
objectives.
 
b.  Command Relationships
 
(1)  Commander, US Special Operations Command will designate the CAISE
Commander.

(2)  The CAISE is a functional comp
 
(3)  The CAISE is OPCON to USNO
 
(4)  USNORTHCOM executes all PSYOP capabilities and forces through the
SYOP
es would have been requested by civil authority for planning
before a pending event occurs or immediately after occurrence through the proper
susce ptability to critical information dissemination actions.
  
c.  Comm
onent of USSOCOM.
RTHCOM, when activated.
CAISE, when activated.  Additionally, under ideal circumstances P
capabilities and forc
channels to DOD. Such a proactive strategy will create awareness for
ptibilities and acce
and, Control, Communications, and Computers.  See Annex K  
-------------------------------------------------------------------------

Obviously 'CIVIL AUTHORITIES' are simply NORTHCOM puppets.

The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated

SO, WHO ARE THESE PEOPLE'S ENEMIES?
According to THEM...pg 56
"We become the "irregular" force in the protracted Global War on Extremists and move increasingly to preventative and preemptive actions. "

Now, how do THEY define 'extremists'? ... and, exactly What are THEIR actions going to be?

ALAN WATT READING A CLUB OF ROME DOCUMENT...

Alan:  Then they sum it up:

             "The real enemy…"

Alan:  --Which they have chosen, remember, to make you believe in.

             "The real enemy then is humanity itself."



MORE...

-------------------------------------

WHAT IS THE DIFFERENCE?






"[I ]f all of the leaders of the Third Reich had been sadistic monsters and maniacs then these events would have no more moral significance than an earthquake, or any other natural catastrophe. But this trial has shown that under a national crisis ordinary, even able and extraordinary men can delude themselves into the commission of crimes so vast and heinous that they beggar the imagination. No one who has sat through the trial can ever forget them. Men sterilized because of political belief. A mockery made of friendship and faith. The murder of children. How easily it can happen. There are those in our own country, too who today speak of the protection of country of survival. A decision must be made in the life of every nation at the very moment when the grasp of the enemy is at its throat. Then it seems that the only way to survive is to use the means of the enemy to rest survival upon what is expedient, to look the other way. The answer to that is: Survival as what? A country isn't a rock. It's not an extension of one's self. It's what it stands for. It's what it stands for when standing for something is the most difficult. Before the people of the world let it now be noted that here in our decision, this is what we stand for:
Justice, truth and the value of a single human being."


Judgment At Nuremberg (Movie 1961)
http://www.youtube.com/watch?v=N3BwK51YFgQ
http://www.script-o-rama.com/movie_scripts/j/judgment-at-nuremburg-script-transcript.html




From: ALAN WATT
"CRISIS CREATION BY THE CLUB OF ROME - CLUBBING US TO DEATH"

http://www.cuttingthroughthematrix.com/transcripts/Alan_Watt_Blurb_CrisisCreationClubOfRome_May302007.html
May 30, 2007 [Please read all of Alan Watt's analysis in the link above, it is amazing]


[...]
Here it is, summing it up. This is what all this is meant lead your mind to: coming to their conclusion.

             "The common enemy of humanity is man."
 
Alan:  Here's a beautiful psychopathic ability to double-think.

"The common enemy of humanity is man."

Alan:  This is the new enemy, you see, we always need enemies to come together to fight, to work, to strive towards, and to be taxed silly.

             "…in searching for a new enemy to unite us, we came up with the idea…"

Alan:  I'll read that again.

"…in searching…"

Alan:  “In searching,” not in finding.

             "…in searching for a new enemy to unite us, we came up with the idea that pollution, the threat of global warming, water shortages, famine and the like would fit the bill."

Alan:  Now for the hard of thinking, I'll repeat that part.

"…in searching for a new enemy to unite us, we…"

Alan:  We--

"…we came up with the idea that pollution, the threat of global warming, water shortages, famine and the like would fit the bill."

Alan:  That should be chiseled in your stone or painted on your living room walls; you could read it everyday, because if you forget this, you'll fall for everything else that just comes your way in your lifetime.

To continue:

             "In their totality and in their interactions, these phenomena do constitute a common threat which demands solidarity."

Alan:  Their goal is solidarity, like a religious movement.

"…of all peoples, but in designating them as the enemy, we fall into the trap about which we have already warned, namely mistaking symptoms for causes. All these dangers are caused by human intervention, and it is only through changed attitudes and behavior that they can be overcome."

Alan:  Behavior changes, behavior modification, you see.

Then they sum it up:

             "The real enemy…"

Alan:  --Which they have chosen, remember, to make you believe in.

             "The real enemy then is humanity itself."


This is a summary of a religion that's been indoctrinated and has been over the years, many years, which will bring in their new idealized society; but we have to believe in it, like a religion, to make it happen. And you think that your governments are making all these decisions for you.

Since the 1960’s, massive funding went into preaching the new environmentalism, the Gaia [or Gaea] worship, the overpopulation, “the sky is falling” attitudes that we've been brought along with.  Now you do have a generation that's grown up hearing nothing but this, who believe it's all true. Their reality is induced through propaganda and indoctrination, and reinforced by further propaganda, ongoing propaganda. A term they used in circles at the top, back in the 1940’s and '30’s even, they called it "continuing education."  That was their couching term for it, which would confuse Joe Average, but it literally meant: beginning with early childhood indoctrination at school and furthered down through time with newspapers, magazines, the radio and eventually television, to reinforce their original lies, until Joe Average and Jane Average think it’s all real and they behave accordingly.  

It’s no different than the way religion was used before that, where you'd run through the forest, terrified of all the demons behind every tree; and shadows, as the sun would move and cast the shadows; and it would get dark and you'd run into that big church, where it’s full of light and God was there to dispel all the darkness. It made you feel better and safe, and you clung to the holy men because they could save you.

Any reality can be induced, given time, reinforcement and promulgated from the top down, as the ancients talked about in Greece, when they discussed this many times in the writings of various philosophers. How many generations have lived, died, fought in wars, had moments of pleasure and masses of misery, never knowing that their reality and their belief system (and everything else) was given by a small dominant minority with the history of the ages and the sciences therein? Nothing has changed.

Eventually, you will see children who will volunteer for sterilization, thinking they're doing the world a great deed (or if they're singled out), because they will be told; and this is coming. It's been discussed, written about and published that they have defective genes. They might even have an allergy, “oh, my,” and they shouldn't really put that on to another generation of inflicting misery. You'll see the first generation being "enhanced," as they call it. That's was put forth to the public, through fiction again; the Star Trek series and the eventual space station series (I don’t know what they called it).  "Genetic enhancement,” see the movie, "Gattaca," good predictive programming.  

However, they will volunteer for sterilization, and probably get some social benefits if they go ahead and do this. Ultimately, of course, they won't need humans to breed, at the low levels. They've discussed this and published it too.  Charles Galton Darwin talked about the elite not altering themselves or altering their brains, because they must retain survival capabilities and instincts, since they will be steering the ship of Earth. Whereas Koestler, by the way, for all his so called leading of the left-wing worked for MI6 (declassified now). He said "the masses of people won't need their survival capabilities because the state will be making their decisions for them."

Therefore, we're going through just one part of an ongoing process.  It was ongoing and planned for your parents, grandparents and back through time. Masses of people have lived and died, never knowing reality; and that's what we're up against—those who steal our ability to be sentient. They decide what we will be, by giving us a scripted version of reality.  They often, in their arrogance, do come out with statements, psychopathically, because they are psychopaths, you see. Psychopaths have tremendous ego. They love to say, "Well, we really told you. It's just that you didn't listen," and they do tell us, and they chuckle that we don't get it because we cannot imagine people being so evil as to do what they do. That's why they get away with it. They're helped by myriads of bureaucrats, who, once again are conditioned in their little tunnel and they can't think outside of it either.  They will rationalize what they do, no matter what it is and no matter who suffers.

Get the book. Read through it, and you certainly will learn, by their own admissions that: the reality that you've had, and the one they're going to give you, was designed by them.

From Hamish and myself, it's good night, and may your god or your gods go with you.


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline shipgeek

  • Member
  • *****
  • Posts: 2,046
Good thread so much useful information. Would take hours to go through.
It is good to have all the links centered in one place.
Many thanks to all those who provided all the info. A lot of work here.

E MARE LIBERTAS

Online Jacob Law

  • Member
  • *****
  • Posts: 3,367
  • Its the Law, face it!
Good thread so much useful information. Would take hours to go through.
It is good to have all the links centered in one place.
Many thanks to all those who provided all the info. A lot of work here.


What do you under-stand?

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
Let's do some dot connecting:

Here's a screencap of a portion of the 1st page of the PDF.  Notice the name of the defense contractor.

http://handle.dtic.mil/100.2/ada421528
Look how they constantly PRETEND to not be engaging in 100% illegal operations, pretend to give a f*ck about any aspect of real privacy.  Remember though, that we've already exposed that the word "privacy" from their point of view simply means more surveillance, with diminished, and then eventually no oversight nor accountability.
Department Of Homeland Security Tells Congress Why It's Monitoring Facebook, Twitter, Blogs
http://www.fastcompany.com/1816814/department-of-homeland-security-explains-social-media-monitoring-project-to-congress
BY Neal UngerleiderThu Feb 16, 2012

According to testimony, the Homeland Security Department has outsourced their own social media monitoring program to an outside contractor, defense giant General Dynamics. General Dynamics was the sole party to the original DHS contract, which was not offered to any outside parties--and Chavez was caught misleading the Committee about General Dyamics' sole status.

General Dynamics employees responsible for the DHS social media monitoring contract are required to attend a training course in DHS privacy practices several times a year. If General Dynamics employees misuse the personal information of journalists, public figures or the general public (to include Twitter or Facebook users) in any way, their punishment is restricted to additional training classes or dismissal from the project.

General Dynamics and the Department of Homeland Security are primarily engaging in keyword monitoring of social media. Callahan admitted in sworn testimony that the bulk of the keywords used by DHS were chosen as the result of being included in commercially available, off-the-shelf bulk packages. These bulk keyword packages were later customized according to DHS specifications. (continued)

http://www.rawstory.com/rs/2012/02/23/secret-documents-reveal-dhs-lied-about-tracking-social-media/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheRawStory+%28The+Raw+Story%29&flv=1
Secret documents reveal DHS lied about tracking Americans on social media
By Stephen C. Webster
Thursday, February 23, 2012 17:14 EST

One of the nation’s leading electronic privacy groups claimed this week that the Department of Homeland Security (DHS) misled members of Congress during a recent hearing on whether the Department is paying a defense contractor $11.4 million to keep tabs on protected free speech and dissent against government policies on the Internet.

The Electronic Privacy Information Center (EPIC), which triggered the hearing by publishing a trove of secret government documents in January, told Raw Story on Thursday that a second round of documents they’ve obtained directly contradicts testimony given on Feb. 16, showing that the DHS instructed their analysts to do exactly what the Department denied.

“There were several exchanges that they had with members of Congress in which they sort of distanced themselves from the idea — that they weren’t engaging in this monitoring of public reaction to government proposals,” McCall told Raw Story. “But that’s… Well, it’s not true, according to the documents we obtained.”

In a letter (PDF) sent Wednesday to the ranking members of the House Subcommittee on Counterterrorism and Intelligence, Ginger McCall, who directs EPIC’s Open Government Project, explains that details within the document directly contradict testimony given during the hearing (PDF).

Altogether, the documents released by EPIC in January and in February reveal that the Department is paying defense contractor General Dynamics to monitor the Internet for “reports that reflect adversely on DHS and response activities,” including “reports that pertain to DHS and sub agencies — especially those that have a negative spin on DHS/Component preparation, planning, and response activities,” among other things.

“The DHS testimony, as well as the documents obtained by EPIC, indicate that the agency is monitoring constantly, under very broad search terms, and is not limiting that monitoring to events or activities related to natural disasters, acts of terrorism, or manmade disasters,” McCall explained to lawmakers. “The monitoring is designed to be over-broad, and sweeps in large amounts of First Amendment activity. The DHS has no legal authority to engage in this monitoring.”

In an email exchange, DHS spokesman Matthew Chandler insisted that they only monitor social media “for situational awareness purposes only, within the clearly defined parameters articulated in our Privacy Impact Assessment (PDF), to ensure that critical information reaches appropriate decision-makers.” He added that the DHS will “review the language contained in all materials to clearly and accurately convey the parameters and the intention of the program.”

Documents published by EPIC show that analysts were instructed to watch for “both positive and negative reports” about the Federal Emergency Management Agency (FEMA), U.S. Citizenship and Immigration Services (CIS), U.S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), and the strangely wide-ranging “organizations outside of DHS.” Other “items of interest” include discussions about immigration policies, drug policies, cyber security matters, and U.S. foreign policy.

About 300 pages of documents (PDF) obtained through a Freedom of Information Act lawsuit and published by EPIC in January revealed that analysts were specifically told to scour the Internet and social networks like Facebook and Twitter in search of “any media reports that reflect adversely on the U.S. Government,” and to zero in on discussions criticizing government policies and proposals.

Revelations in that initial round of documents triggered a Feb. 16 Congressional hearing and sent DHS officials backpedaling, insisting that type of monitoring was only discussed, not implemented. On the same day of the hearing, EPIC published its second round of documents, revealing a DHS manual on social media monitoring dated “2011,” which carries detailed instructions on what agency analysts are supposed to look for.

“This has a profound effect on free speech online if you feel like a government law enforcement agency — particularly the Department of Homeland Security, which is supposed to look for terrorists — is monitoring your criticism, your dissent, of the government,” McCall told Raw Story.

Reached for comment, aides to subcommittee Chairman Patrick Meehan (R-PA) and ranking member Jackie Speier (D-CA) said they had not read EPIC’s letter, offering no further statements.

Similarly, General Dynamics did not respond to a request for comment, and it is still not clear if the company actually produced reports for the DHS detailing public dissent against government policies, or if the Department’s instructions to social media analysts were even ever implemented.

EPIC said that its lawsuit against DHS was continuing, and that they would press members of Congress for further hearings on the matter. Meanwhile, they have proposed that Congress suspend the DHS program and investigate whether these same practices are being carried out by other agencies.

It is already a matter of public record that the U.S. Air Force has purchased software used for “persona management” across multiple social media platforms, which gives information operatives the ability to control a virtual army of fake people online. Military officials told Raw Story that the software was being used for “classified social media activities” overseas.

This fits in with this 'urban security' essay - notice that in this essay they were looking at people's daily walking behavior. Notice also that the cameras and cell phones are being employed to monitor exactly that behavior.

http://arstechnica.com/science/news/2010/02/cell-phones-show-human-movement-predictable-93-of-the-time.ars

Quote
Cell phones show human movement predictable 93% of the time

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses. (My note: Anticipating the spread of virsues - mymy - city planning - as in where to put the dome cameras and sensors next to cover every possible avenue)

It's not currently possible to know exactly where everyone is all the time, but cell phones can provide a pretty good approximation. Cell phone companies store records of customers' locations based on when the customers' phones connect to towers during calls. Researchers realized that taking this data and paring it down to users who place calls more frequently might allow them to see if they could develop any measure of how predictable human movements and locations are (My note: And this, my friends, is why they're hooking up these phones to Social Network sites and using Dynamic Social Network Analysis - it's so that they can put a face, a personality, and your likes and dislikes to this faceless 'node' that is walking around in their system). The users they worked with placed calls an average of once every two hours, connecting to towers that cover an area of about two square miles.

The authors analyzed various aspects of the information related to the calls, as well as information that could be aggregated over multiple calls: number of distinct locations, historical probability that the location had been visited in the past, time spent at each tower, the order in which customers usually visited towers, and so on. With these numbers, the authors could create measures of the entropy of the customers' trajectories (My note: Entropy - this word and concept came up in a previous research paper that I linked to - conveniently, it was also about using cell phones to track people). To control for uncertainty, they also looked at instances where a customer was not in communication with the grid and effectively invisible to them, and removed those that had frequent extended periods of invisibility.

Most customers seemed to stick to the same small area, a radius of six miles or less, but there were a few callers that regularly traveled areas of a radius of hundreds of miles. It would seem that the cell phone users who traveled the least would be the most predictable in their movements, but the authors found this to be untrue. All users were roughly equally predictable, regardless of the size of their typical traveled region. Everyone seemed to have a set area that they rarely left, and that area was always traveled in a very regular way—even the jet-setters appear to rarely deviate from their travel patterns.

Customers that stuck to the same six-mile radius had predictability rates of 97 to 93 percent, and this fell off as the typical area of travel grew. But the predictability eventually stabilized, and remained at 93 percent even as the radius of travel rose to thousands of miles. Regardless of how widely they traveled, the researchers could adequately predict their locations, down to the specific tower, 93 percent of the time.

Breaking down the schedules of users by the hour allowed the authors to see how the variability changed during the course of a day. As might be expected, users' locations had the lowest measures of regularity during transition periods, such as the hours before and after work and during lunch times. Customers also had a 70 percent likelihood of being at their number one most-visited location at any random point in time. That's quite a high number, considering that randomizing positions over the average number of locations visited per person gives a 1.6 percent likelihood of finding them at each one.

The authors note that this research has a variety of practical implications. Knowing how easy it is to predict human movement, mobile communications businesses could anticipate data load (we're looking at you, AT&T) and city planners could use the data to inform their models of traffic flow. The big limitation of the study was the restriction of the analysis to fairly frequent cell phone users, but it might be possible to combine this with other data sets to form harder and faster human location predictions.


This is a PR handout - they report on this with a straight face, and they don't even point out the obvious ways in which this stuff can (and IS) used for total Big Brother surveillance and control. Has the whole world gone mad or what? Has their brain been fried completely? How can they NOT see this as being total Big Brother - totally unnecessary - totally sick and degrading? All these tech sites and their sucking up to the establishment - f**k all these guys and f**k their predecessors before them. None of the IBM guys at the Nazi concentration camps seemed to object either - that's what utter scum this industry is - hiding behind the veil of 'liberal' Jon Stewart viewers 'concerned about the environment/concerned about the whales being slaughtered by Japan', but they're fine with this type of goddamn total Big Brother, police state surveillance - oh yes, it's a 'great system', isn't it guys?

Check out this post - this is from our cute and liberal friends over at the 'Social Computing and Behavioral Modeling' symposium - btw, their next symposium is being held this March - I hope Sociostudent is going there so we can gain a perspective on this stuff.

Inferring Social Network Structure using Mobile Phone Data (MUST SEE)
http://forum.prisonplanet.com/index.php?topic=156337.msg929440

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
See this link:  http://forum.prisonplanet.com/index.php?topic=156337.msg929428#msg929428
Lot's of images there, so don't want to bog down this already large thread with a ton of big images.

From the same guy (Nathan Eagle):

This PDF is entitled 'Observing The Masses Through The Mobile Phone'. (go check out the PDF yourself if you don't believe me).

http://www.socialsciences.cornell.edu/0508/sciencereport_formatted_10.12.pdf

Inferring Social Network Structure using Mobile Phone Data
Nathan Eagle



In a classic piece of ethnography from the 1940s, William Whyte carefully watched the
interactions among Italian immigrants on a street corner in Boston’s North End (1).
Technology today has made the world like the street corner in the 1940s—it is now
possible to make detailed observations on the behavior and interactions of massive
numbers of people.
These observations come from the increasing number of digital
traces left in the wake of our actions and interpersonal communications. These digital
traces have the potential to revolutionize the study of collective human behavior.




In this paper we demonstrate the power of collecting behavioral social network data from
mobile phones.


This study follows ninety-four subjects using mobile phones pre-installed with several
pieces of software that record and send the researcher data on call logs, Bluetooth devices
in proximity, cell tower IDs, application usage, and phone status
(17). These subjects
were observed via mobile phones over the course of nine months
, representing over
330,000 hours of data (about 35 years worth of observations).


Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Shock Docs: Total Federalization of Police Under
New Homeland Security Mission
Mission Creep:
DHS Agency Abandons Fighting Terrorism, Shifts to Hiring Police,
Taking Over America

http://www.infowars.com/shock-docs-total-federalization-of-police-under-new-homeland-security-mission/
Aaron Dykes
Infowars.com
January 24, 2012

A new white paper presented to the House Permanent Select Committee on Intelligence carves out an ‘evolving mission’ for Homeland Security that moves away from fighting terrorism and towards growing a vast domestic intelligence apparatus that would expand integration with local/state agencies and private-public partnerships already underway via regional fusion centers.

Crafted by the Aspen Institute Homeland Security Group, co-chaired by former DHS chief Michael Chertoff and composed of a who’s who of national security figures, the report outlines a total mission creep, as the title “Homeland Security and Intelligence: Next Steps in Evolving the Mission” implies.

Significantly, it puts on paper and into the Congressional record a proposed transition from outwardly dealing with the threats posed by terrorism towards intelligence gathering “focused on more specific homeward-focused areas.” That is, the homegrown, domestic threats we’ve heard so much about from Big Sis already.

In short, it confirms the intentions of key insiders– including former NSA/CIA head Michael Hayden, former Rep. Jane Harmon, former Secretary of State Madeline Albright, 9/11 Commissioners Philip Zelikow and Richard Ben-Viniste, former National Security Advisor Samuel Berger and others– to flesh out a plan we have already seen developing from an outside perspective– namely, to build a domestic Stasi-like force to takeover, monitor and control the population.

Moreover, the media has reported on this changed mission– towards the full spectrum domination of the people under a patently-fascist framework– with the same calm as the weekly weather forecast.

LOCALIZED INTELLIGENCE: HIRING POLICE & BOWING TO PRIVATE INTERESTS

Achieving this new aim includes co-opting local law enforcement and other regional agencies.

“As the threat grows more localized,” the report reads, “the federal government’s need to train, and even staff, local agencies, such as major city police departments, will grow.”

That’s right, the feds want to oversee the hiring of your local police.

Fusion Centers, now spread across the nation, have already infected police agencies and local governments with a federalization takeover mentality. A Dec. 2010 Aspen Homeland Security Group report, quoting the Superintendent of the New Orleans Police Department, recommends that “every mayor and governor of a major city in the country should have to attend a DHS-sponsored emergency management course where various scenarios – like hurricanes, levy breaks, and explosions – are exercised.”

But directing local police departments, mayors and governors is only the beginning. Indeed, the Aspen group envisions the ‘foundation for a separate DHS intelligence mission’ by building upon ‘decentralized’ partnerships with the private sector as well.

Homeland Security Should Re-Orient Its Mission, Aspen Panel Says


The bloated umbrella agency aims to lean on its ties with the hospitality (hotel), security and transportation industries, among others, as well. Already, Homeland Security conducts background checks on many security guards working with ‘critical infrastructure,’ and clearly, it aims to expand the use of quasi-government groups like InfraGard and other private snitch networks. Ultimately, all employment would be subject to federal background checks and security clearances.

Private interests should even shape Homeland Security priorities, according to the report: “different private sectors in the United States, from the hospitality industry to transportation, should drive requirements for DHS.”

ABANDONING THE FIGHT AGAINST TERRORISM

As unbelievable as it sounds, DHS says other agencies can handle the all-encompassing threat of terrorism that was used to justify the super-agency’s own existence and powers.

Abandoning specific focus on tracking terrorist cells and organizations, DHS instead plans to shift into broad coverage of border protection, integrating travel data, cyber defense, critical infrastructure protection and other areas.

“There are enough agencies pursuing the terrorist adversary to allow DHS to build a new analytic foundation that emphasizes data, analytic questions, and customer groups that are not the focus for other agencies,” the report states.

And funding should be cut from terrorism-focused areas:

“Analysis that helps private-sector partners better understand how to mitigate threats to infrastructure, for example, should win more resourcing than a focus on all-source analysis of general threats, such as work on assessing the perpetrators of attacks. Conversely, all-source analysis of terrorist groups and general terrorist trends should remain the domain of other intelligence agencies.”

Instead, the “national security experts” who’ve brought us naked body scanners, checkpoints on highways, streets, airports, bus & train stations, and who have projected the homegrown terror threat into the theaters of private hotels, shopping malls and sports stadiums, are again expanding the bureaucratic growth of tyranny by infiltrating areas traditionally spared from federal intrusion.

A promotional article at the Homeland Security News Wire blog highlights the shift: “With a slew of intelligence agencies with similar missions safeguarding the United States, the report posits that DHS should avoid competing with other agencies and overlapping responsibilities, instead focusing on its areas of core strengths – analysis and the dissemination of critical intelligence to local law enforcement agency, the private sector, and critical infrastructure operators.”

“THE NEW, GROWING WORLD OF HOMELAND SECURITY INTELLIGENCE”

Further the Aspen report recommends “an entirely new enterprise,” stating that “DHS might consider the development of a homeland security training institute.” It hails the security-complex workforce that has been fostered by Homeland Security in the decade since 9/11, now seeking to influence and train its future recruits as well.

The report verifies previous information suggesting that DHS wants to comb the American homeland with private security contractors, trained and overseen by Homeland Security– a giant army of enforcers and snitches, brainwashed by propaganda scaremongering about terrorism, who could respond to crime as a whole with an atmosphere of universal preemptive suspicion that targets anyone who appears out of place.

“Working with state/local/private sector partners to draw their intelligence capabilities into a national picture” is a stated aim of this redirection of Homeland Security’s core mission. Installing and training individual members of these partner groups- from local police departments to the eyes and ears it would tap in the security, transportation and infrastructure industries- would facilitate the kind of over-arching homeland security infrastructure the document aims to construct over society.

DOMESTIC EXTREMISM: TARGETING AMERICAN SOCIETY

Doing so would put greater emphasis on the kind of politically-slanted domestic profiling (read: “intelligence product“) that has already drawn criticism and forced the agency to disavow one of its own reports, which targeted ‘right-wing extremism’:

The numerous federal and other officials familiar with the matter Homeland Security Today interviewed frankly said the April 7, 2009 DHS report that generated so much outrage, Right-wing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, was the most “poorly constructed” analytical “product in DHS history,” and that numerous reports dealing with rightwing extremists have in fact been produced by DHS since it disavowed that one report.


The Department of Homeland Security was sold to public on a wave of fear in the wake of the 9/11 attacks, under the promise of keeping America safe from terrorism. Instead, the Homeland Stasi agency is solidifying its role as a secret police over the United States. Not only have local police agencies been instructed that non-violent protesters, returning veterans and supporters of third party candidates are potential domestic terrorists, but Federal Protective Service (FPS) agents- dispatched with Homeland Security oversight- have been caught arresting photographers and spying on dissenters (in this case during an Occupy Wall Street protest in Portland).

Recent Homeland Security-related documents have already revealed that the American people have been designated as an enemy under emergency plans and that the feds are contracting and activating FEMA relocation centers for use during a crisis or catastrophe.

MISSION CREEP: HANDING OVER UNACCOUNTABLE POWER

Sadly, this warped mission creep is nothing new to the United States’ intelligence agencies.

Former President Harry Truman lamented the CIA’s extreme power grab some 16 years after he signed the bill ushering it– and the entire national security infrastructure– into existence. One month after the JFK assassination in 1963, he stated:

“For some time I have been disturbed by the way the CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the government… I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations.”

Behind the scenes, it was former CIA director Allen Dulles, along with a number of fellow travelers, who crafted the CIA’s transformation under a limited, intelligence gathering mandate into the unaccountable monster it became. During a decade as head of the CIA, Dulles utilized the Jackson-Correa white paper he helped write to usher in black ops and other operational aspects never intended to be, from assassinations, to coups, to revolutions, and more (see Col. Fletcher Prouty’s The Secret Team). Suddenly, the CIA was operating from the shadows, a virtual government-within-government, with no clear path towards reigning in its power.

Will the already-controversial Department of Homeland Security be allowed, too, to creep so far into our lives that we can never look back?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline John_Back_From_The_Club_O

  • Moderator
  • Member
  • *****
  • Posts: 9,166
    • From Hell to Veins
One of the biggest reasons why I knew AJ was 'THE REAL DEAL' is that his radio / TV programs primarily focus on the theme that these 'wars' on 'terror' / 'drugs'... ARE SIMPLY EXCUSES TO TURN THESE 'MILITARY OPERATIONS ONTO THE GENERAL PUBLIC.

You don't need a doctorate in history to know that EVERY TIME a government starts to target citizens within it's own borders, ALWAYS under the cry of 'THE ENEMY WITHIN', the average Joe citizen gets sucked into the 'war' and becomes a 'CASUALTY' of those domestic wars on the public.

I feel our job as 'real' average citizens (globally) is to run counter intelligence, EXPOSING who the REAL terrorist of the public at large are, using there own policies / proceedures against them.
The Crowd Shouted... “Give us Barabbas!” ... and People, The NWO Gave Him To You.
http://www.dominicanajournal.org/give-us-barabbas/

https://www.greatagain.gov

Offline chris jones

  • Member
  • *****
  • Posts: 21,649
 it's insidious. the most powerfull military globally  has been compromised.
It makes perfect sense for the elite faction to controll the mightiest nation on earth, their obstacles are the base of this nation, therefor they must be disintergrated.
 Its apparent they have been doing this for many a decade. Al Q, is a faction of their lackeys along with their inserts and controllers. I find it difficult to come to the conclusion Al Q- parse, is to be in any postion to rise to a decision making segment of the elites, they are a faction being used to buffallow the people, effective, yes, but in the circle of power, I have my doubts.