Internet Anthropologist Think Tank: Feds wrong paradigm.

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Thursday, June 12, 2008

    Feds wrong paradigm.

    Top Spook: Facebookers, Gamers May Be Unfit to Spy.

    By Noah Shachtman EmailJune 12, 2008 | 11:16:00 AM
    .....................
    The Office of the Director of National Intelligence (ODNI) -- which, in theory, oversees all of the country's intelligence services -- is looking to launch a series of research studies into "cyber-behavior." Because what wannabe spooks do on-line should play "an important part" in the "process for granting security clearances for personnel working in national security positions." Suspect activities include "social network usage," "compulsive internet use," "distribution of pirated materials," and "on-line contact with foreign nationals."

    The first step is to get a "better understanding" of "which specific cyber-behaviors are normative, acceptable, or favorable as well as identifying those that may be associated with risky or problematic cyber behavior within the workplace."

    ...................................................


    Areas of potential interest include, but are not limited to: social network usage; disclosure of information in computer-mediated activities; extent of on-line contact with foreign nationals; cyber behavior that suggests an unwillingness to abide by rules; compulsive internet use; involvement in computer groups (especially those allied to stigmatized practices); providing false information within computer-mediated communications about oneself or others; procurement and distribution of pirated materials; engaging in deviant cyber-behaviors with the intention of causing harm to others including "hacking" and sabotage.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXX

    If Wired has this right, it is an example of the Paradigm prevalent across the board in Federal
    agencys and an example of why al Qaeda is setting the Internet Paradigm that is eating US militarys lucnch on the Internet, recruiting, funding, hacking, C2, etc.

    Blocking someones security clearance for file sharing is like telling someone they can't become Police officers because they J-walk.
    ( I never file share for security reasons, but file sharing is almost a right of passage for adolescents. )

    "Areas of potential interest include, but are not limited to: social network usage; disclosure of information in computer-mediated activities; extent of on-line contact with foreign nationals; cyber behavior that suggests an unwillingness to abide by rules;"

    I hope Wired has this part wrong, but it sounds like these activities pre-employment show a disposition towards an unwillingness to abide by the rules.

    This thinking precludes the type of personalities best suited to WWW Intelligence work.

    On my staff of "cyber warriors" they must follow rules we set down. Or we bounce them.

    But I want out of the box thinkers, troops that can easily bond with strangers, huge social networks, connected, and the more foreign contacts the better.

    Defining hacking as deviant cyber-behavior, is an acknowledgment of the fear the Feds feel towards the Internet. The Feds don't rule the WWW and want to cut all risks.
    And an acknowledgment they fear they can't control a hacker.

    This is equalivant to the Revolutionary war Military refusing anyone who has hunted with a long distance rifle, and classifying this type of hunting as "deviant hunting-behavior".

    Criminal sanctions preclude us from hacking, but hackers , espically your own ar not to be feared. One must take certian security precautions. The computer you deal with hackers from
    can't have classified info on it, print it , then rescan ot into classified computers, they have not found a way to transmit a virus by paper yet.

    In order to attract the best talent to the WWW war effort, and the Air Force now says the WWW qualifies as a domain, ( and is on the FAST track for WWW dominance ) the Government needs to be embracing hackers, and learning to control them. Bust the violators, and shelter and nurture the hackers willing to come across from the dark side.

    I wonder what would have happened in the Revolutionary WAR if anyone who had fired a Kentucky long rifile was disqualified from serving? For "deviant hunting-behavior".

    Gerald
    Anthropologist

    The Chinese Government has access to a pool of 11,000 Chinese civilian hackers.
    Chinese hackers responsible for '88 per cent of attacks'
    BCS, UK -Jun 3, 2008
    News stories: 1,118 for chinese hackers.




    Zemanta Pixie

    Labels: , , ,

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home