This document discusses intelligence and open source information. It argues that intelligence should focus on decision support, holistic analysis, counterintelligence on domestic threats, and integrated scalable IT. The document outlines a preliminary holistic analytic model and proposes that open source information can address most economic, social and military threats. It advocates for a whole of government approach to intelligence that focuses on cross-cutting issues rather than individual countries or domains. The document also discusses the need for new rules and approaches for intelligence, including greater emphasis on non-traditional threats, cultural and geospatial analysis, and collaborative work.
This is the workshop that accompanies the overview. Words are in planned format.
I am very interested in any invitations to speak and energize, visit www.phibetaiota.net for more information.
My latest thinking on the future of intelligence for traditional intelligence communities (not be be confused with my latest thinking on the open source everything innovation hub). This is the invited keynote, there is also a workshop briefing.
How can public warning be employed not only to respond to terrorism, but to prevent--even preempt--attacks prior to their execution? This is a presentation I gave at the National War College. Missing are the talking points for each slide....
Nine books later most still do not get it -- secret intelligence is largely waste -- unprocessed technical collection that feeds Congressional pork, nothing more.
This is the workshop that accompanies the overview. Words are in planned format.
I am very interested in any invitations to speak and energize, visit www.phibetaiota.net for more information.
My latest thinking on the future of intelligence for traditional intelligence communities (not be be confused with my latest thinking on the open source everything innovation hub). This is the invited keynote, there is also a workshop briefing.
How can public warning be employed not only to respond to terrorism, but to prevent--even preempt--attacks prior to their execution? This is a presentation I gave at the National War College. Missing are the talking points for each slide....
Nine books later most still do not get it -- secret intelligence is largely waste -- unprocessed technical collection that feeds Congressional pork, nothing more.
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
In 2012, I led the first joint cyber operations with the Indian Air Force. Seven years too late, we have started talking about cyber jointness.
“Synergy in Joint Cyber Operations” presented at an Indian National Defence University event. The first time ever that jointness was discussed in the Indian context. Not very verbose for obvious reasons – I flagged politics and turf wars. Some shakeups are happening; the Defence Cyber Agency is up. Winds of change…
One one "cult" brief that is said to be popular with Anonymous and Lutzsec -- I would be glad if that were true. Open Source Everything is now a meme and a mind-set (see my 2012 book), this was the beginning of my final 20 year push.
The US Government has refused since WWII to be serious about intelligence as decision support, instead treating intelligence (and now DHS) and mini versions of the DoD prok process. There is nothing intelligent about how the USG does intelligence, and that is our national sucking chest wound.
Concept for healing the Americas by creating an Open Source Agency and a Multinational Decision Support Centre to get international relations and commerce back on a sound footing, which is say, evidence based rather than driven by corruption and ideology.
Intelligence as a set of permanent institutions dates back only to the second half of the nineteenth century. But as information and news - in the dictionary meaning used in English since the middle of the fifteenth century, of 'knowledge as to events, communicated by or obtained from another, especially military' - it has always been collected as part of warfare
For a military, it can mean knowledge of the enemy and can distinguish between to defeat and to lose because information means knowledge and knowledge are power. Analysts see it as a package of information pending for clarification, and policymakers consider they should be informed so that they can meet the needs, stated or understood.
Intelligence gathers under the same umbrella the informational component of national security, internal and external policies, as well as certain aspects of international security in the case of global cross-entities (states, organizations).
This presentation is built up by gathering information from different references (Book, Articles, and Newspapers) by the author.
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
In 2012, I led the first joint cyber operations with the Indian Air Force. Seven years too late, we have started talking about cyber jointness.
“Synergy in Joint Cyber Operations” presented at an Indian National Defence University event. The first time ever that jointness was discussed in the Indian context. Not very verbose for obvious reasons – I flagged politics and turf wars. Some shakeups are happening; the Defence Cyber Agency is up. Winds of change…
One one "cult" brief that is said to be popular with Anonymous and Lutzsec -- I would be glad if that were true. Open Source Everything is now a meme and a mind-set (see my 2012 book), this was the beginning of my final 20 year push.
The US Government has refused since WWII to be serious about intelligence as decision support, instead treating intelligence (and now DHS) and mini versions of the DoD prok process. There is nothing intelligent about how the USG does intelligence, and that is our national sucking chest wound.
Concept for healing the Americas by creating an Open Source Agency and a Multinational Decision Support Centre to get international relations and commerce back on a sound footing, which is say, evidence based rather than driven by corruption and ideology.
This presentation was made by Wendy McGuinness, Chief Executive of the Sustainable Future Institute at the SANZ UNDESD Future Dialogues. 17 November 2008
a report of the csis homeland security and counterterrorism.docxevonnehoggarth79783
a report of the csis homeland
security and counterterrorism
program and the csis transnational
threats project
September 2011
1800 K Street, NW | Washington, DC 20006
Tel: (202) 887-0200 | Fax: (202) 775-3199
E-mail: [email protected] | Web: www.csis.org
Project Directors
Rick “Ozzie” Nelson
Thomas M. Sanderson
Project Coordinators
Ben Bodurian
David Gordon
Project Senior Advisers
Arnaud de Borchgrave
Juan C. Zarate
Confronting an Uncertain Threat
the future of al qaeda and associated movements
C
o
n
fo
n
tin
g
an
U
n
certain
T
h
reat
N
elso
n
an
d
S
an
d
erso
n
Ë|xHSKITCy066674zv*:+:!:+:!
ISBN 978-0-89206-667-4
a report of the csis homeland
security and counterterrorism
program and the csis transnational
threats project
Confronting an Uncertain Threat
the future of al qaeda and associated movements
September 2011
Project Directors
Rick “Ozzie” Nelson
Thomas M. Sanderson
Project Coordinators
Ben Bodurian
David Gordon
Project Senior Advisers
Arnaud de Borchgrave
Juan C. Zarate
ii
About CSIS
At a time of new global opportunities and challenges, the Center for Strategic and International
Studies (CSIS) provides strategic insights and bipartisan policy solutions to decisionmakers in
government, international institutions, the private sector, and civil society. A bipartisan, nonprofit
organization headquartered in Washington, D.C., CSIS conducts research and analysis and devel-
ops policy initiatives that look into the future and anticipate change.
Founded by David M. Abshire and Admiral Arleigh Burke at the height of the Cold War, CSIS
was dedicated to finding ways for America to sustain its prominence and prosperity as a force for
good in the world.
Since 1962, CSIS has grown to become one of the world’s preeminent international policy
institutions, with more than 220 full-time staff and a large network of affiliated scholars focused
on defense and security, regional stability, and transnational challenges ranging from energy and
climate to global development and economic integration.
Former U.S. senator Sam Nunn became chairman of the CSIS Board of Trustees in 1999, and
John J. Hamre has led CSIS as its president and chief executive officer since 2000.
CSIS does not take specific policy positions; accordingly, all views expressed herein should be
understood to be solely those of the author(s).
Cover photos: Top—President Barack Obama, Vice President Joe Biden and members of the na-
tional security team, including Defense Secretary Robert M. Gates, far right, Secretary of State
Hillary Rodham Clinton, and Navy Adm. Mike Mullen, standing, chairman of the Joint Chiefs
of Staff, receive an update on the mission against Osama bin Laden in the Situation Room of the
White House, May 1, 2011. A classified document seen in this photograph has been obscured.
White House photo by Pete Souza, http://www.defense.gov/dodcmsshare/homepagepho-
to/2011-05/hires_P050111PS-0210c.jpg. Middle—Map of.
A more polished simple attempt to explain to the University of Maryland at College Park how they could become the hub for a world brain and a school of future-oriented hybrid governance. No joy.
The USA is hosed until such time as We the People eradicate the two-party tyranny, restore integrity to our electoral process, and demand that governance be transparent, truthful, and trustworthy.
Pitch to President of George Washington University on creating a School of Future-Oriented Hybrid Governance and a World Brain Institute. He never bothered to respond.
First presentation of the local to global range of gifts table that disintermediates, eliminates NGO waste and theft, and allows for meeting needs of all people through a data-driven sparse matrix that leveraging multiple individual humans to meet specific needs.
By invitation of Stephen E. Arnold one of my IT heroes, put forward a few thoughts on real time information. Without Open Source Everything, the information sharing and sense-making we need to do is simply not possible.
Failed attempt to get the Undersecretary of Defense for Intelligence (today the Director of National Intelligence) to be serious about producing decision-support instead of simply spending money wantonly.
Offered in Beirut by invitation, lots of interest but UN bureaucracy, like the US Government political leadership, is absolutely not interested in the truth at any cost even if it lowers all other costs.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfEnterprise Wired
In this guide, we'll explore the key considerations and features to look for when choosing a Trusted analytics platform that meets your organization's needs and delivers actionable intelligence you can trust.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
Adjusting OpenMP PageRank : SHORT REPORT / NOTESSubhajit Sahu
For massive graphs that fit in RAM, but not in GPU memory, it is possible to take
advantage of a shared memory system with multiple CPUs, each with multiple cores, to
accelerate pagerank computation. If the NUMA architecture of the system is properly taken
into account with good vertex partitioning, the speedup can be significant. To take steps in
this direction, experiments are conducted to implement pagerank in OpenMP using two
different approaches, uniform and hybrid. The uniform approach runs all primitives required
for pagerank in OpenMP mode (with multiple threads). On the other hand, the hybrid
approach runs certain primitives in sequential mode (i.e., sumAt, multiply).
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
2. ON INTELLIGENCE:
Whole of Government, Whole Earth,
NATO, SOF, & Doing the Right Thing
A discourse rooted entirely in my personal experience since 1976
(strategy, policy, acquisition, operations, & intelligence).
Robert David STEELE Vivas
Earth Intelligence Network, Phi Beta Iota Public Intelligence Blog
The Truth at Any Cost Reduces All Other Costs.
3. The Americans
always do the
right thing..….
they just try
everything else
first.
Sadly, we must never, ever, [ever] underestimate
the capacity of the Americans to think of new
wrong things to try before they might get it right.
4. On the Shoulders of Others
(There is a need) to recognize that just as the essence of knowledge is not as split up into
academic disciplines as it is in our academic universe, so can intelligence not be set apart
from statecraft and society, or subdivided into elements...such as analysis and estimates,
counter intelligence, clandestine collection, covert action, and so forth.
Rather … intelligence is a scheme of things entire. (Bozeman 1998: 177).
The intelligence institutions have neglected support of judgment. This is partly due to being
disinvited to help shape the sovereign’s judgment, but also partly due to mistaking who the
sovereign has become. The people’s judgment is now being poisoned by ideologues who have
filled the void.
The situation is not honestly and soberly appreciated. Societal
sense-making suffers due to the failure of the intelligence function and the craft to support it.
(Senior US serving officer, 2012)
Reformations and transformations are not the same thing. Reformations are
concerned with changing the means systems employ to pursue
their objectives. Transformations involve changes in the
objectives they pursue. (Ackoff, 2004)
5.
6.
7. Admiral James G. Stavridis, USN
Former NATO SACEUR
Open Source Security
Imagine global security driven by
collaboration -- among agencies,
government, the private sector and the
public. That's not just the distant hope of
open-source fans, it's the vision of James
Stavridis, a highly accomplished Navy
Admiral. Stavridis shares vivid moments
from recent military history to explain
why security of the future should be built
with bridges rather than walls.
What will 21st-century security look like?
Navy Admiral James Stavridis suggests
that dialogue and openness will be the
game-changers.
We must build bridges. Sharing
information is how we connect
everything.
8. Brigadier General Ferdinand Irizarry II
Deputy Commanding General
USAJFK Special Warfare Center and School
• First Active Duty Civil Affairs
Colonel to make flag since
WWII
• First Commanding Officer of
the first US Army Civil Affairs
Brigade since WWII
• Earned Executive Agency for
the Joint Civil Affairs
Information Management
System
• Positioned to nurture White
SOF to co-equal status with
Black SOF, a vision articulated
by General Peter Schoomaker,
USA, then CINCSOC (1997)
• LACKING: USG Whole of
Government PPBS and global
whole systems analytic model
10. Theory of Intelligence I
Theory of Knowledge (Epistemology)
Intelligence Is:
• Actionable Answers
• Decision-Support
• Evidence-Based
• Holistic Process
Intelligence Is Not:
• Applied Knowledge
• Beliefs in Isolation
• Consciousness
• Covert Action
• Espionage
• Secret Information
• Wisdom
11. Theory of Intelligence II
Purpose, Not Process
Intelligence should not
be defined by Inputs
• Requirements
• Sources
• Processing
• Analysis
• Production
• Covert Action
• Being Wrong
Intelligence should be
defined by Outputs.
• Answers to Specific
Questions
• Appraisals of Specific
Situations
• Forecasts of Specific
Factors in Context
• Being Right
19. What Threats Should We Consider?
01 Poverty
02 Infectious Disease
03 Environmental Degradation
04 Inter-State Conflict
05 Civil War
06 Genocide
07 Other Atrocities
08 Proliferation
09 Terrorism
10 Transnational Crime
High-Level Panel on Threats, Challenges, & Change (including LtGen Dr. Brent Scowcroft),
A More Secure World: Our Shared Responsibility (United Nations, December 2004)
20. What Strategies & Policies Apply?
01 Agriculture
02 Diplomacy
03 Economy
04 Education
05 Energy
06 Family
07 Health
08 Immigration
09 Justice
10 Security
11 Society
12 Water
Mandate
for
Change
Various Presidential
Transition Teams
21. Preliminary Holistic Analytic Model
Core Gaps in Holistic Analysis
Essential to Future-Proofing
What US IC
Focuses On.. Nigeria
22. Who Owns the Future?
Demography Rules [Minister-Mentor Lee Kuan Yew]
Projected for 2050
India 1.7B
China 1.3B
USA 0.4B
Nigeria 0.4B
Indonesia 0.3B
Pakistan 0.3B
Brazil 0.22B
Bangladesh 0.19B
Philippines 0.15B
Congo DR 0.15B
Ethiopia 0.15B
Mexico 0.14B
Tanzania 0.14B
Russia 0.13B
Egypt 0.12B
Japan 0.11B
Viet-Nam 0.10B
Kenya 0.96B
Uganda 0.94B
Turkey 0.91B
32. US Nuclear Plants in Flood Zones US Nuclear Plants in Earthquakes Zones
Not Addressed Above: Aquifer Draw & Contamination, Surface Water Contamination
33. STRATEGIC
TECHNICAL
Long Term (100 Years)
Imminent
1 Year Out
90 Days Out
72 Hours Out
4 Years Out
25 Years Out
12 Years Out
Whole of Government Institutions*
Cross-Cutting Threats & Policies
OPERATIONAL
* In Order of Secession to Presidency TACTICAL
** Cabinet Rank Not In Succession
Poverty
Infectious Disease
Environmental Degradation
Inter-State Conflict
Civil War
Genocide
Other Atrocities
Proliferation
Terrorism
Transnational Crime
Agriculture
Diplomacy
Economy
Education
Energy
Family
Health
Immigration
Justice
Security
Society
Water
President
Vice President
State
Treasury
Defense
Justice
Interior
Agriculture
Commerce
Labor
Health & Human Services
Housing & Urban Development
Transportation
Energy
Education
Veterans Affairs
Homeland Security
Environmental Protection Agency**
Office of Management & Budget**
US Trade Representative**
US Ambassador to the UN**
Council of Economic Advisors**
Small Business Administration**
36. Government
Military
Law Enforcement
Business
Civil Societies
Media
Academia
Non-Profit
Information
Commons
37. Human Information Pathologies
Censoring
Cheating Culture
Fog Facts
Forbidden Knowledge
Forgotten Knowledge
Incestuous Amplification
Lies
Lost History
Manufacturing Consent
Missing Information
Propaganda
Rule by Secrecy
Weapons of Mass
Deception
Weapons of Mass
Instruction
41. Languages In (Discovery)
Languages Out (Sharing)
Six UN
Languages
Arabic
Chinese
English
French
Russian
Spanish
Practical
Experience
33 Core
12 Arabic
Minimum for
Global
Coverage
183
42.
43. Counter-Intelligence
• Counterintelligence should be the center of gravity for
the future of secret intelligence.
• Counterintelligence must focus on our domestic
enemies more so than our foreign enemies.
• Counterintelligence must be able to expose and
destroy domestic political and financial traitors.
• Offensive counterintelligence is not being done and
needs to be a long-term endeavor.
• Counterintelligence cannot overcome the
irresponsibility of NSA and others who refuse to be
serious about cyber-security or even cyber-integrity.
• The FBI is an ineffective and compromised bureaucracy.
46. Holistic Analytics for Intelligence
C4I
INF
ENG
ARTY
ARM
AVN
AAA
LOG
CSS
IO
SEA
CIV
SPC
C4I
INF
ENG
ARTY
ARM
AVN
AAA
LOG
CSS
IO
SEA
CIV
SPC
C4I
INF
ENG
ARTY
ARM
AVN
AAA
LOG
CSS
IO
SEA
CIV
SPC
C4I
INF
ENG
ARTY
ARM
AVN
AAA
LOG
CSS
IO
SEA
CIV
SPC
47. Acquisition Generalizations
1. All Countries or Some Countries?
2. Coastal & Capital Areas & Main Channels or All Areas?
3. Warfighting Only or Full-Spectrum Peace & Relief Also?
4. Worst-Case Everything or Holistic Balance?
5. C4I Assumed or Mandated?
6. Continuous Threat Support to All Mission Areas?
7. Operational Test & Evaluation? With/Without FORMAT?
• Threat is both conventional and
unconventional
• Ground threat complex & lethal
• Air threat night/all-weather
and integrated air defense
systems
• Naval threat from coastal guns
and missiles severe
• Insurgencies are a constant
• Mountains, deserts, jungle, and urban
environments require distinct approaches
• Majority of the operational areas are hot
and humid, standard aviation limited
• Cross-country mobility a show-stopper
• Line of sight distance under 1,000 meters
• Bridge-loading & tunnel clearance issues
• 50% ports not usable, C-130 fields most
common—we lack long-haul air
• Cultural terrain far beyond our ken
49. Doing Intelligence
What do we need to
know, when, in what
fashion, for optimal
total sustainable effect?
50. Fundamentals of Intelligence
25 Years – US$1.2 Trillion
Still Do Not Have This!
1. Whole of Government
Decision-Support
2. Holistic Analytics with
True Cost Economics
3. Counterintelligence
on Domestic Enemies
4. Integrated Scalable IT
5. Open Requirements
Showing Satisfaction
& Connecting Clients
6. Spend with Integrity
51. Requirements Definition
• From Each Functional Area
• For Each Mission Type
Step 1 Mission A
Step 4
Asst Scty A
RQMTS
DEF
Mission C
Mission D
Mission B
Asst Scty B
Collection Management
• To Each Collection Discipline
• Specifics and Deadlines
HUMINT/OSINT
COLL.
MGMT
SIGINT
IMINT
MASINT
Country A
Country C
Country D
Country B
Program Development
• Of Your Organic Capabilities
• Unique to Function/Mission Support
HUMINT/OSINT
CAPAB.
BLDG.
SIGINT
Evaluation
• Of Each Collection Discipline
• Specifics and Deadlines
HUMINT/OSINT
EVALUA-TION
SIGINT
IMINT
MASINT
Country A
Country C
Country D
Country B
IMINT
MASINT
Mission A
Mission C
Mission D
Mission B
Step 3
Step 2
External Fails
THEREFORE
Your-Specific
Capabilities
Required & Put
Into PPBS. Keep
OMB Informed.
Asst Scty B
Asst Scty D
52. New Rules
001 Decision-Support is the Raison D'être
002 Value-Added Comes from Analysis, Not
Secret Sources
003 Global Coverage Matters More
004 Non-Traditional Threats Are of
Paramount Importance
005 Intelligence w/o Translation is Ignorant
006 Source Balance Matters More
007 "Two Levels Down“
008 Processing Matters More, Becomes
Core Competency
009 Cultural Intelligence is Fundamental
010 Geospatial and Time Tagging is Vital
011 Global Open Source Benchmarking
012 Counterintelligence Matters More
013 Cross-Fertilization Matters More
014 Decentralized Intelligence Matters More
015 Collaborative Work and Informal
Communications Rise
016 New Value is in Content + Context + Speed
017 Collection Based on Gaps versus Priorities
018 Collection Doctrine Grows in Sophistication
019 Citizen "Intelligence Minutemen" are Vital
020 Production Based on Needs versus
Capabilities
021 Strategic Intelligence Matters More
022 Budget Intelligence Is Mandatory
023 Public Intelligence Drives Public Policy
024 Analysts are Managers
025 New Measures of Merit
026 Multi-Lateral Burden-Sharing is Vital
2004 NEW RULES for the New Craft of Intelligence
65. Wild Card: The Virgin Truth
The Virgin Truth gains first-mover advantage with
OSE – delivering public knowledge faster, better,
cheaper while earning profit.
The Virgin Truth will help eradicate the 50% that is
fraud, waste, and abuse, and profit from being the
hub for an educated public.
66. Wild Card: NATO
“Open Source Security”
1st of 3 Multinational Decision-Support Centres
67. United Nations
Assistant Secretary General
Open-Source Decision-Support
Director
Open Source Agency
Director
World Brain Institute
Director
Open Source
Consortium
Director
The Virgin
Truth
NATO/ACT
Director
Human Factors Program
Autonomous Internet
Open Source Everything
Liberation Technology
African Union
Intelligence Network
Community of Latin
American and
Caribbean States
Intelligence Network
(Asian) Regional
Comprehensive Economic
Partnership Intelligence
Network
68.
69.
70. The truth at any cost
lowers all other costs.
BE the Force!
Editor's Notes
Note: Words are pro forma. Delivered extemporaneously.
You can download this briefing, with words in Notes format, at Tiny URL forward slash 2013-Steele, where I have also placed the Overview briefing and a few other links.
Most of my views were developed and published in 1988-1994 but have been ignored. Now we have a new generation of leaders rising, bloodied by a ten year multi-trillion dollar war justified on the basis of 935 now-documented lies.
I believe they – and the young people coming into employment – thirst for truth, to the point that I am now refering to “Generation Truth.”
PAUSE. I fear the US will not make any useful changes in the next four years – perhaps even the next eight.
I plan to work for 20 more years, but my challenge is to find a government, international organization, or university that actually wants to implement my ideas.
Meanwhile, do not underestimate the Americans – they have a gift for discovering new ways to be wrong.
It has been my good fortune to combine a diversity of experience with a wealth of learning from others. Will Durant continues to be my primary mentor. Here I simply want to highlight three others; Ada Bozeman, a serving senior officer, and Russell Ackoff.
PAUSE. We are fragmented; we have lost our integrity; and we are still making changes on the margin instead of transforming toward doing the right thing.
This is reality. In fact-checking this quote for my next book I received an email that said that the original exchange with the J-2 determined that only 20% of everything the J-2 touched was secret; and that within that 20%, only 20% again was truly unique to the secret world.
4% at best from the secret world, and I venture to say, 10-15% at best from what passes for an open source world.
This is the concluding sentence of Jim Bamford’s book Body of Secrets. I share with Sir David Omand the view that Human Intelligence (HUMINT) is central to all that we do.
We must broaden and deepen HUMINT while putting technical intelligence in its place, which is to say, do not collect what you cannot process, focus the processing on what the human analysts need. Just in time collection, processing, and analysis is an inherently human function.
Alvin Toffler recommended me to NATO in 2000 when they could not afford him.
He believes, as Admiral Stavrides and I both believe, that information is a substitute for violence and a means of creating infinite wealth.
War is only profitable for bankers. It is not profitable for nations or peoples. NATO has a new commander, a moral man I am told, perhaps he will attend to these views.
Elsewhere, amidst some grave shortfalls in both intelligence and integrity across our senior leaders, both uniformed and civilian these past 12 years, there are those – such as Admiral Stavrides and his successor General Breedlove – and the officer shown here – BGen Ferd Irizarry, who may lead Special Operations (White) into the future – whom I would follow anywhere. Between NATO and SOF White, we have an opening for doing the right thing.
With due regard for earlier efforts to address the theory of intelligence, I suggest that the fundamental question has yet to be asked.
To what end do we “do” intelligence?
What is the purpose of intelligence?
I will not be waxing eloquent – epistemology is my only big word today.
This is my view. We have lost ourselves in the process, while being blind to the vast majority of the sources & methods, because secrecy has destroyed accountability and perpetuated systems whose primary value is pork – corruption.
In my view, intelligence is about the creation of ethical evidence-based decision-support. Nothing more – or less.
Put most succinctly, intelligence must be defined by its outputs, not by its inputs.
In the American system, people get promoted for spending money and hiring more people. They do not get promoted for doing more with less and no one is penalized for getting it wrong. Thomas Drake has it right – the American secret world is about moving money, it is not about producing intelligence.
Most do not execute the proven process of intelligence, or balance resources among four major levels of effort.
This particular concept was developed by Jan Herring, the first National Intelligence Officer for Science & Technology, and it is still, in my view, an essential starting point for both public sector and private sector decision-support.
Here I place intelligence – and particularly open source intelligence – in the proper moral and political context of long-term accountability and legitimacy.
Intelligence – decision-support – is something that we all require. For the US national intelligence community to continue to ignore their responsibility to adapt to the demands and the possibilities of the new era is – in my view – a persistent betrayal of the public trust.
Intelligence is ethical evidence-based decision-support. Nothing more, and nothing less.
It must be used to support strategic priorities, all manner of policies, all manner of acquisition, and all operations by all parties – field harmonization.
We still need spies and secrecy, but only if rooted in a broad foundation of public intelligence with open communications.
Colin Gray remains my touchstone for strategic thinking along with the usual suspects from the past. What I especially admire about Colin is his grasp of time – the one strategic variable that can not be bought nor replaced.
In 2010 I supported a UNESCO project on governing water, and also did my book INTELLIGENCE for EARTH: Clarity, Diversity, Integrity, & Sustainability. This graphic shows the larger context for intelligence. Decision-support is needed for hybrid governance, for establishing consensus across all boundaries while fully developing whole systems analytic models and embracing true cost economics as a foundation for ground truth. Down the road I wish to fully integrate education, intelligence, and research. That is a strategic vision.
I completely understand that the US IC refuses to collect on all that it should because it assumes that the consumers of intelligence are responsible for that.
This is an assumption long over-due for termination. It is in my view essential that we recast intelligence as something that is done by both the traditional producers of intelligence and the consumers –and that this all be done in a holistic manner.
My colleague Dr. Herman Daly has done more than any other to properly articulate the importance of true cost economics. I hope he is honored with a Nobel in his lifetime.
It took one of my most persistent associates a full year to document what you see here. Others have done similar work for other products, services, and behaviors. It is now possible to buy a single fish whose life history is online.
I continue to be troubled by the moral and intellectual shallowness that permits an obsession with inter-state conflict and terrorism, to the exclusion of all else.
This list, in priority order, should be the foundation for intelligence with integrity at every level by every form of organization.
At the same time, the US Government fails to demand – or create -- ethical evidence-based decision-support for Whole of Government. Key policies are developed in isolation from one another, and within any given department – for example agriculture – many programs can be in direct opposition to one another.
Absent a holistic model that treats true cost economics as a foundation for evaluating returns on investment, we should not expect effective governance.
Now we see the threats and the policies together. I not only believe that the US IC must play a forcing function with respect to Whole of Government collection, processing, and analysis, but that the greatest threat to our future lies in the top three non-military threat areas.
These top three threats, across all the policy areas, are how we future-proof cities and states.
The Western Hemisphere has failed to make the most of the time since the end of WWII and the more recent end of the Cold War, a fictional conflict created by the arms merchants. Nothing matters more than how we all address the education and health of the global population.
This is my most important graphic in the past decade, or so I believe.
You can see where most governments are still positioned, treating intelligence as secrets for the president and generally only in relation to national security writ violent.
It would be so easy – so inexpensive, to run the table out, I am just appalled that there is not a single mandarin willing to act on my ideas, and this one especially.
In 2004, I used the UN high-level threat panel’s finding, the first-ever consensus list, to speculate on the relative utility of open sources. I continue to marvel that the US refuses to be serious about open sources.*
* No, the OSC is not serious. 100 T-1 lines, and HUMINT took overt human sources away from them. The measure of US IC OSINT is in Global Trends 2030 – junk.
Energized by NATO, and by my continuing relationship with the Strategic Studies Institute of the US Army, I developed a monograph and then a book on the new craft of intelligence in 2002.
These are such simple sensible concepts, one must conclude that anyone rejecting them is doing so not on their merits, but rather on the basis of another agenda far removed from the public interest.
And now to policy where one word, one word alone, will suffice.
INTEGRITY.
As I have written online, there is no conflict between intelligence and politics provided both keep their integrity.
For myself, while I have not given up on America the Beautiful as an ideal, for me the past twenty years have been about INTEGRITY LOST.
The politics of intelligence are a challenge.
Intelligence is the least influential, in part because by virtue of the secrecy it has chosen to maintain, it can be so easily ignored.
Until US intelligence learns how to do public intelligence in the public interest, it will continue to be a sideshow – an expensive sideshow.
In 1992 I developed these four threat classes with the specific intent of justifying four different intelligence approaches including new capabilities; and also to eventually justify four forces after next, not just the one size fits all force that we still have today.
It takes decades to create and train capabilities suited to each of these threats; we have failed at all four.
Now we see the threats and the policies together. I not only believe that the US IC must play a forcing function with respect to Whole of Government collection, processing, and analysis, but that the greatest threat to our future lies in the top three non-military threat areas.
These top three threats, across all the policy areas, are how we future-proof cities and states.
In the ideal, all of our intelligence disciplines should be working together and providing decision support to all of our whole of government mission areas.
Among them, open source intelligence, a twin to human intelligence, offers the most promise, while the technical disciplines fight tooth and nail to remain retarded.
It is in this context that I have high hopes for M4IS2 – Multinational intelligence.
In the US system, Cabinet officials and Congress represent the recipients of taxpayer revenue, not the citizens themselves. The Office of Management and Budget does not manage anything at all, and such policies as we have are generally isolated, incomplete, bespoke, often in conflict with one another, and expensive in their ignorance.
Here I show my proposed new form of Whole of Government intelligence.
This is a simple depiction of the water threat across the USA, and it barely scratches the surface.
Here, mindful of Colin Gray’s emphasis on time as the one strategic variable that can neither be bought nor replaced, I try to depict a holistic approach to the needs of Whole of Government across all threats and policies, but with the dimension of time added.
Intelligence – superb intelligence – can be done by humans without computers. The opposite statement is not true.
I created this graphic a decade ago, and I fear it is not yet appreciated. It is the first graphic in my chapter, “The Evolving Craft of Intelligence,” in the Routledge Companion book coming out in August.
In this context, secret intelligence for the top-down unilateral approach is vastly less important than public intelligence that can inspire bottom-up multi-lateral consensus harmonizing the spending and behavior of larger coalitions on non-military threats.
There are eight tribes of intelligence; it is not possible to be fully effective without harnessing the distributed intelligence of all eight of these tribes. The government is the most ignorant and least flexible of the eight tribes.
All tribes have secrets. Where we have failed terribly is in ensuring that we can all share the majority of the information that is not secret.
In the course of my very broad reading in the past decade, I have created this partial list of information pathologies – all human, and all demanding concerted effort to overcome, particularly when policy and political leaders are loosely-educated and morally ambivalent.
This is our landscape, and in my view, the acme of skill for the intelligence professional should be to overcome all of these.
When I testified the Aspin-Brown Commission in 1995 I was preceded by RAND, and they said – I do not make this stuff up – that everything in the open source world was on the Internet and they knew how to get it.
Still today, less than 2% of the digital information is indexed by Google, and the bulk of “local knowledge” is not online and not in English. Only the skilled human can achieve the precision reach we need.
I have adapted this slide from Stephen Few of Virtual Business Intelligence.
Computers do repetitive tasks well. They do not deal with the unanticipated – and if our educational systems continue to decline, neither will our humans.
I am of the view that national intelligence must be rooted in a stellar general education system that lifts all minds, not just those of the elite 1%.
My colleague Dick Klavens, a pioneer along with Eugene Garfield of citation analytics, created this depiction in the late 1990’s to illuminate just how fragmented our scientific disciplines and sub-disciplines have become.
This is the context within which we must transform national intelligence.
Lastly we have languages, ever the Achilles heel of Anglo-Saxon intelligence. My own experience finds 33 languages essential, including Catalan, Gailic, and Hebrew.
I understand from others that there are twelve versions of Arabic with significant nuanced differences that cannot be overcome in the moment – they must all be nurtured over decades so as to be persistently conversant and instantly available for field deployment as needed.
This graphic is from my monograph for the U.S. Army Strategic Studies Institute. Humans matter more than technology.
Counterintelligence and clandestine humans must be treated with the greatest delicacy and regard, not as they are today, and for good reason.
At the same time, we must manage ALL of our human assets, both national and external, as part of a HUMINT whole.
The greatest surprise to me personally these past twenty years has been the growth of my profound respect for and interest in counter-intelligence.
Here are just a few thoughts of mine. The damage done to the USA by its own home-grown traitors, whatever their motivation be it religious, ideological, or financial, is vastly more costly than any possible combination of external threats.
The Marine Corps Intelligence Center was created in 1988 primarily because the other service intelligence centers were then and still are now completely dishonest. Sadly, the Marines appear to have become just another paper mill.
Acquisition intelligence is what assures a proper force structure, one trained, equipped, and organized to be effective against honestly-established threats.
I have participated in two force structure reviews, and understand how difficult it is to get mission area leaders to pay attention to facts.
Today the F-35 is the face of treason, along with the continuing “budget share” approach to defense acquisition.
Intelligence is supposed to support a holistic strategy, calculated policies, evidence-based acquisition, and whole of government operations. Ours does not.
The Marine Corps Intelligence Center was created in 1988 because nothing the national, defense, or other service intelligence centers were doing was holistic, relevant to the Third World, or structured so as to support expeditionary mission area strategy, policy, acquisition or operations. This is the top level view of the analytic model we created, you can find all the gory details by searching for 1990 Expeditionary Environment Analytic Model.
Here are a few generalizations from that period in my life. As best I can tell, no one today in the USA is addressing the seven factors I consider important.
The lower half of this graphic provides some of the generalizations we discovered when we did what we were supposed to do. Elsewhere I have published my views on our need for a 450 ship Navy, a long-haul Air Force, and an air-liftable Army – and our complete withdrawal from all our overseas bases.
In 1989, for the first time ever, I brought together every analyst across intelligence and operations having anything to do with the Russian T-72 tank as present in Libya.
Here is what I learned from them. Now imagine doing this honestly for every mission area across every country.
And now to my conclusion.
For me, intelligence is tailored decision-support. It should be available to and appreciated by every human being, and it should be delivered at two levels:
First, tailored to the specific individual one answer to one question at a time; and
Second, in the aggregate, tailored to the community as a whole, helping the individuals reconcile competing views.
In 1990, still a government employee, I identified six fundamental challenges that we needed to address if we were to evolve into the 21st Century. Not only was I ignored, but we still do not have solutions for all six of these challenges today.
Speaking only of the US secret world, I see $1.25 trillion dollars wasted, on top of which we have another $10-15 trillion in high crimes and elective wars that secret intelligence did nothing to stop.
Over the next 12 years, I hope, the secret intelligence budget will be cut back to $30 billion, and at least $15 billion of the savings will migrate toward new non-secret intelligence capabilities to be created and maintained by the traditional consumers of intelligence.
The key is in requirements definition, and in tracking requirements not met, something that is simply not done, so as to justify new non-IC capabilities..
These are the 26 new rules for the new craft of intelligence, easily found online as the full chapter. At the bottom is the full briefing for these rules, also with words in Notes format. All of these rules are by their very nature the opposite of what we persist in doing with our obsession about secret war. We have literally forgotten – and this generation may never have known – that the purpose of intelligence is to produce decision-support.
We still have three challenges:
01 Integrating the high side – 80 isolated systems— 2,500+ codeword compartments – and counting
02 Assuring the high side of access to the unclassified information
03 Integrating the unclassified and keeping it safe from classification and manipulation
I know how to do the second and third; I do not believe the first is possible.
This is the first of four technical graphics. While I started the OSINT fight in 1988, in the past decade I have become persuaded that ALL of the opens can and must come together to achieve the affordable sustainable break-throughs that we require, especially in relation to sharing and cross-boundary sense-making in real time. The secret world will continue to decline in utility unless it embraces OSE as a foundation. OSE is our path to a World Brain & Global Game – and smart spies.
These six bubbles are as conceptualized by Earth Intelligence Network. Among our 24 co-founders remains Medard Gabel, co-creator with Buckminster Fuller of the analog World Game, and architect of the digital EarthGame, one that could be built for just $3 million a year. Note how there is a budget element and a policy element, both open to the public. True cost information would be embedded within the EarthGame, showing cause and effect and related costs.
This graphic pulls it all together. It is possible, in the astonishingly near future, to create Smart Nations, a World Brain, a Global Game, and with this architecture, harness the distributed intelligence of the Whole Earth.
For an early glimpse of what is possible, visit Crisis Mappers and see what they are doing with SMS messages, diaspora translations and map plotting, and the integration of various open source apps.
Others at CIA knew in 1986 precisely what analysts needed in the way of desk-top functionalites. As a founding member of the Advanced Information Processing and Analysis Steering Group I still remember being shocked by our discovery that there were over 20 such projects across the agencies, with NSA having multiple versions, each spending $10M a year or so but on a different vendor, different prime software, etcetera. We still do not have this a quarter century later. Why not?
I was one of the original Information Warfare and cyber-intelligence pioneers in the 1990’s, and I regret to say that my warning letter in 1994 made no impression on the US Government.
Everything we are doing in cyber-security is flat out wrong. I strongly recommend that Brazil, China, India, and Russia, among others, lead the development of a completely new global information instructure.
This is the vision I briefed to the Coalition Coordination Center (CCC) in Tampa in 2006. What they did for logistics we need to do for intelligence. There are four special relationships depicted here.
Perhaps most important is the use of national militaries as the C4I hubs for interlocking reach-back into the eight tribes of each respective nation.
Reciprocity will be vital across this scheme.
For over a decade if not longer I have been calling for the closure of unilateral stations under official cover, and their replacement with multinational stations.
The 80-20 rule works for me. Think of these as focusing 80% of their financial, technical, intellectual, and cultural capacity on open sources, and the other 20% on deep secret sources.
Most do not execute the proven process of intelligence, or balance resources among four major levels of effort.
This particular concept was developed by Jan Herring, the first National Intelligence Officer for Science & Technology, and it is still, in my view, an essential starting point for the Open Source Agency.
To prosper, we must meet the decision support needs of all elements of society.
This may be my most subversive graphic. If implemented, it does three things:
01 Explodes giving from the one billion rich, 80% of whom do not give now
02 Collapses the current archipelago of inefficient and dishonest aid schemes by holding them accountable in detail
03 Dramatically increases the efficiency of all coming together with ENOUGH at the household level of resilience.
I own three of the four World-Brain URLs and will donate them to any university willing to fund me for two years as we raise funds for everything depicted here. It will be self-supporting by year five at the latest.
I believe there is a huge market for public intelligence “by the drink,” but the various pieces are not quite ready for integration.
With or without the United Nations, Brazil, China, India, and Russia, among others, can create a World Brain and an open source everything (OSE) global information technology network that harmonizes how we all spend, invest, and behave into the future. The wasteful practices of the USA must not be replicated; the US approach to energy must not be followed. We can do so much better working on the basis of ethical evidence-based decision-support.
Some of you may find this of interest. It was delivered to Sir Richard by hand of a retired MI-6 officer who received it from Alfred Rolington, perhaps the most successful CEO in the open source world along with Mats Bjore in Sweden.
I earnestly believe that free cell phones and free Internet access along with free education will create wealth from which a percentage can be derived by the ISP.
NATO is a wild card. Admiral Stavrides was on to a very important idea, and I can only hope that his successor will continue to be interested in these possibilities.
I would of course be delighted to help build the world’s first M4IS2 Decision-Support Centre on the shores of the Mediterranean, and then see Chile and Singapore or Indonesia replicate and enhance their own variation of this capability.
All of my efforts to encourage the US President and Director of National Intelligence, the Secretary General of the UN and Ambassador Rice, Secretaries Kerry and Hagel, have come to naught.
This is my complete vision. I could have this up and running within the year given only $125 million to start.
PAUSE
China has already taken steps to convert those that wish to the yuan as a reserve currency, and to also offer an alternative to the SWIFT banking system that has been turned against Iran, very unwisely in my view. I believe the time has come for the eight greater demographics to test a new multinational information-sharing and sense-making toward their mutual benefit. In each region of the world, ethical evidence-based decision support is the best tool for creating peace & prosperity.
This is my final graphic. As you might imagine, across nine books and many articles, briefings, chapters, and lectures as well as testimony, I have given this a great deal of thought. In my view, this graphic captures what we should be doing but do not do. If we are to be successful intelligence professionals in the 21st Century, this is our starting point. From where I sit, the US IC gets an F across the board, isolated bits notwithstanding.
The truth at any cost lowers all other costs.
You can find this briefing with words in Notes format, at Phi Beta Iota the Public Intelligence Blog, which also offers a free subscription to daily posts by over 25 contributing editors.
I am actively seeking a home for these ideas; I am globally mobile – this is how I want to spend the next 20 years of my life.
Thank you.