The hippie alumni STILL haven’t figured it out. After moving to the West Coast, Leary hooked up with a group of ex-surfers, the Brotherhood of Eternal Love. Thanks to the vigorous interventions of the Clinton White House, the cult of secrecy remained unmolested. John Perry Barlow is cofounder of the Electronic Frontier Foundation. suggest that Barlow not only has strong ties to CIA but may have been involved in the conceptual genesis that spawned CIA-connected entities such as Facebook: Fascinating article by John Perry Barlow, can’t believe I haven’t seen this before. That said, I draw a clear distinction between the institutions of intelligence and the folks who staff them. Right now, we have to do something, and preferably something useful. For more than a year now, there has been a deluge of stories and op-ed pieces about the failure of the American intelligence community to detect or prevent the September 11, 2001, massacre. Whereas the so-called counterculture was an outgrowth of programs developed by the intelligence community, the bulk of its alumni are charter members of the “un-intelligence community”: Say, what’s the latest from Jerry Garcia? Nonetheless, I sallied forth, confidently telling the gray throng that power lay not in concealing information but in distributing it, that the Internet would endow small groups of zealots with the capacity to wage credible assaults on nation-states, that young hackers could easily run circles around old spies. Now [our enemies] have access to state-of-the-art….In 40 years the world went from 5,000 stand-alone computers, many of which we owned, to 420 million computers, many of which are better than ours.”. But of these, the only one with any operational force–a requirement that a public-interest declassification board be established to advise the Administration in these matters-has never been implemented. The unofficial al Qaeda Web site, http://www.almuhajiroun.com, is considerably more revealing. Despite all the efforts aimed at sharpening their tools, intelligence officials have only become progressively duller and more expensive. “Somehow, over the last 35 years, there was an information revolution,” one of them said bleakly, “and we missed it.”. You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE. I then watched a Strangelovian spectacle when, during my talk, many arms crept up to cross involuntarily and were thrust back down to their sides by force of embarrassed will. But rather than listen to the committee’s essential message that they should renounce the sorts of nefarious deeds the public would repudiate and limit secrecy to essential security considerations, the leadership responded by pulling most of its agents out of the field, aside from a few hired traitors. FTR #692 Women in the Klan (“Palin by Comparison,” Part 2), Exit Stage Right: Eugenio Martinez Dies (What Was Richard Nixon Doing In Dallas, Texas, on 11/22/1963? “At the massive agency level, if I had to ask, ‘Do we need blue gizmos?’ the only person I could ask was the person whose job security depended on there being more blue gizmos.”. . Although their finished products rarely make explicit use of what’s been gleaned from the media, analysts routinely turn there for information. A few of its recommendations eventually were wrapped into the Intelligence Authorization Act of 2000. If you are connected to the internet, you are not truly secure. This is not to say that many of them weren’t operatives and/or assets. What’s not so readily available is the plutonium and tritium, which require an entire nation to produce. With regard to Barlow, whatever his family lineage he may have had, his career suggests “spook” all over. 5 Yet we are still protected by agencies geared to gazing on a single, centralized threat, using methods that optimize obfuscation. Let’s attempt to turn that proposition around. While Hayden spoke, the 200 or so high-ranking intelligence officials in the audience sat with their arms folded defensively across their chests. Period. We maintained a closed system for nuclear design while designing electronics in the open. It would use off-the-shelf technology, and use it less for gathering data than for collating and communicating them. I imagine this entity staffed initially with librarians, journalists, linguists, scientists, technologists, philosophers, sociologists, cultural historians, theologians, economists, philosophers, and artists‑a lot like the original CIA, the OSS, under “Wild Bill” Donovan. We enter an era of asymmetrical threats, distributed over the entire globe, against which our most effective weapon is understanding. “Why Spy?” by John Perry Barlow; Forbes; 10/07/02. This was an alien notion to them. This part cracks me up: it’s “mystical superstition” to imagine that wires leaving a building are also wires ENTERING a building? Mr Emory, here’s the link to the Barlow claim: https://ramblinjoemusicblog.files.wordpress.com/2011/10/john-perry-barlow-cognitive-dissident.pdf, FTR #936 The Making of Donald Trump (Top Banana Republic), Part 5, FTR #937 The Trumpenkampfverbande, Part 11: Settling In (The Underground Reich Comes into Plain View, Part 4), Intellectual and Political Prostitution at Harvard (A “Zero” Sum Game) UPDATED ON 2/25 and 2/26/2021. %PDF-1.7 /N 3 /SA true 146 talking about this. In May 2000, I began to understand what they were up against. 746 talking about this. ” . Only one-third of the employees at the CIA speak any language besides English. This group became the largest LSD synthesizing and distributing organization in the world. I just don’t know about the Laurel Canyon scene, in the final analysis. How then, can the institutional sum add up to so much less than the parts? Hayden decried “the stovepipe mentality” where information is passed vertically through many bureaucratic layers but rarely passes horizontally. An enigmatic, multi-lingual and well-traveled individual, Stark worked for the CIA, and appears to have been with the agency when he was making the Brotherhood’s acid. stream Of what use are the NSA’s humongous code-breaking computers if no one can read the plain text extracted from the encrypted stream? Part 5a 46:15 | Part 5b 45:52 | Part 5c 42:56 | Part 5d 45:11 | Part 5e 11:25 I’ve always had spooky feelings about Cerf, Dyson, and Kapor. Like the CIA I encountered, Hayden’s NSA was also a lot like the Soviet Union; secretive unto itself, sullen, and grossly inefficient. The resulting differences cut deep. Annie Jacobsen’s “Operation Paperclip” has an excellent account of how the SS developed “Acid” and then handed it off to CIA after the war. Their shortcomings go back 50 years, when they were still presumably efficient but somehow failed to detect several million Chinese military “volunteers” heading south into Korea. (The previous flash drive was current through the end of May of 2012.). The counterproductive information hoarding, the technological backwardness, the unaccountability, the moral laxity, the suspicion of public information, the arrogance, the xenophobia (and resulting lack of cultural and linguistic sophistication), the risk aversion, the recruiting homogeneity, the inward-directedness, the preference for data acquisition over information dissemination, and the uselessness of what is disseminated-all are the natural, and now fully mature, whelps of bureaucracy and secrecy. Perhaps this new Open Intelligence Office (OIO) could also work closely with a Clandestine Intelligence Bureau, also separate from the traditional agencies, to direct infiltrators and moles who would report their observations to the OIO through a technological membrane that would strip their identities from their findings. The NSA was also, by his account, as technologically maladroit as its rival in Langley. Facebook. They told me they’d brought Steve Jobs in a few weeks before to indoctrinate them in modern information management. At the nerve core of The Company, five analysts sat around a large, wooden lazy Susan. /Type /ExtGState . . Where I expected to see computers, there were teletype machines. The operatives would be legally restricted to gathering information, with harsh penalties attached to any engagement in covert operations. n�3ܣ�k�Gݯz=��[=��=�B�0FX'�+������t���G�,�}���/���Hh8�m�W�2p[����AiA��N�#8$X�?�A�KHI�{!7�. “All of their primitive networks had an ‘air wall,’ or physical separation, from the Internet. Let’s create a process of information digestion in which inexpensive data are gathered from largely open sources and condensed, through an open process, into knowledge terse and insightful enough to inspire wisdom in our leaders. Twitter. It would be open to information from all available sources and would classify only information that arrived classified. The “consumers” (as they generally call policymakers) are unable to determine the reliability of what they’re getting because the sources are concealed. As a result, the consumers are increasingly more inclined to get their information from public sources. They hated their primitive technology. The CIA & LSD More about us They were cut off. Can you provide a link and/or printed reference to the allegation you have presented? The same applies, in concentric circles of self-protection, to one’s team, department, section, and agency. For someone whose major claim to fame was hippie song-mongering, addressing such an audience made me feel as if I’d suddenly become a character in a Thomas Pynchon novel. confederations, national and international organizations), 12 of which were closely linked to gender issues. “We are riddled with watertight information compartments,” he said. He went on: “After World War II we were ahead of the Soviets in nuclear technology and about even with them in electronics. The Blood Film and Count (Part 2), medlatech, medical laboratory technology, Haemopoietic cells, Myeloblasts, Promyelocytes, Myelocytes, Metamyelocytes, Band cells, Nucleated red blood cells, The blood count, Haemoglobin concentration, Haematocrit or packed cell volume, Cell counts, Red cell indices, How to examine a blood film, Learning to look at blood films 176 talking about this. A former Marine intelligence officer, Steele moved to the CIA and served three overseas tours in clandestine intelligence, at least one of them “in a combat environment” in Central America. Being off-the-shelf, it could deploy tools while they were still state-of-the-art. I’m astonished that anyone’s astonished. ”, http://www.forbes.com/asap/2002/1007/042_2.html. When I got up to essentially sing the same song in a different key, I asked them, as a favor, not to assume that posture while I was speaking. . I was invited to speak to the Intelligence Community Collaboration Conference (a title that contained at least four ironies). 2y�.-;!���K�Z� ���^�i�"L��0���-��
@8(��r�;q��7�L��y��&�Q��q�4�j���|�9�� Intelligence has been focused on gathering information from expensive closed sources, such as satellites and clandestine agents. They admitted that it might be even more dangerous to security to remain abstracted from the wealth of information that had already assembled itself there, but they had an almost mystical superstition that wires leaving the agency would also be wires entering it, a veritable superhighway for invading cyberspooks. PDF | On Jan 1, 2014, Paul E. Simonsen and others published Manson's Tropical Diseases, 23rd Edition: The Filariases | Find, read and cite all the research you need on ResearchGate /op false It is not uncommon at all to see kids of spooks following in the family profession. The recipe for a nuclear bomb has been generally available since 1978, when John Aristotle Phillips published plans in The Progressive. Go to their Web site today and you will find a lot of press releases, as well as descriptions of maps and publications that you can acquire only by buying them in paper. Wikipedia can generally be handicapped to the left. A more immediate problem would be keeping existing agencies from aborting the OIO as soon as someone with the power to create it started thinking it might be a good idea. 37 Full PDFs related to this paper. /AIS false The Cold War was officially over, but it seemed the news had yet to penetrate where I now found myself. H���yTSw�oɞ����c
[���5la�QIBH�ADED���2�mtFOE�.�c��}���0��8��8G�Ng�����9�w���߽��� �'����0 �֠�J��b� After 40 years, we are at parity in nuclear science, whereas, thanks to our open system in the study of electronics, we are decades ahead of the Russians.”. The entity I envision would be small, highly networked, and generally visible. . For a guy who never shuts up about networking, he should get that there is nothing “mystical” about such a notion. And they were delighted when I returned later, bringing with me a platoon of Internet gurus, including Esther Dyson, Mitch Kapor, Tony Rutkowski, and Vint Cerf. If you believe it will cause hallucinations, then you will have them. Cosponsored by conservative Republicans Jesse Helms and Trent Lott, among others, this legislation was hardly out to gut American intelligence. Get the insider's guide to exploring the real Caribbean. /Filter /FlateDecode LIBRO - Medical Parasitology (Abhay Satoskar) There’s a site called Gnostic media that goes into LSD. LinkedIn. The surprise attacks on the World Trade Center and the Pentagon were only the most recent oversight disasters. . But the cultural terror of releasing anything of value remains. First, it does not address the pressing need to reestablish clandestine human intelligence. tored (59 on Facebook and 26 on Twitter). The next speaker was Dr. Edward Teller, who surprised me by not only agreeing but pointing out both the role of open discourse in scientific progress, as well as the futility of most information security. But while OSINT may be a timely notion, it’s not popular in a culture where the phrase “information is power” means something brutally concrete and where sources are “owned.”. As one general put it, “I don’t want information that requires three security officers and a safe to move it in around the battlefield.”. Or so I thought. They felt unappreciated, oppressed, demoralized. Talk about a faith-based initiative. Its been written that while “protesting” the Vietnam war, he got so riled up that he strapped 25 lbs of explosives to himself, headed up to Boston and threatened to detonate it in the middle of Harvard Yard. Timothy Leary’s early research into LSD was subsidized, to some extent, by the CIA. Uncommon Caribbean is Steve and Patrick Bennett, two brothers from St. Croix changing the way people think about travels to the Caribbean by putting authentic aspects of island life and the region's unique cultural heritage in the spotlight ahead of the glitzy, one-size fits all tourist trap image popularized over the years. Reddit. Another systemic deficit of intelligence lies, interestingly enough, in the area of good old-fashioned spying. I don’t know how to deal with that one. Now we have to do that same task in the information age, and we find ourselves less adept,” he said. They are committed free marketeers in the commerce of thought. Get the insider's guide to exploring the real Caribbean. ��w�G� xR^���[�oƜch�g�`>b���$���*~� �:����E���b��~���,m,�-��ݖ,�Y��¬�*�6X�[ݱF�=�3�뭷Y��~dó ���t���i�z�f�6�~`{�v���.�Ng����#{�}�}��������j������c1X6���fm���;'_9 �r�:�8�q�:��˜�O:ϸ8������u��Jq���nv=���M����m����R 4 � Get the insider's guide to exploring the real Caribbean. You become more powerful based on your capacity to know things that no one else does. /CA 1 All of their primitive networks had an “air wall,” or physical separation, from the Internet.