Feral Jundi

Sunday, September 5, 2010

PMC 2.0: Paying Your Local Guard Force With ‘Mobile Cash’

     This is an excellent article that discusses a very unique solution to a problem that we are dealing with in the war zones and other places throughout the world.  When companies subcontract with local guard companies for security, you often hear about how the managers screw over their guard force by skimming off the top of their pay.  They do all sorts crappy things to their people, and it can do a lot of damage to the morale of the guard force.

     The idea of mobile cash is about how the customer that pays for this guard service, can ensure that their contracted guard force is getting paid on time and in full via cell phone/text messaging.(read the article below for details) This is especially pertinent in war zones where telecom might be up and running, but not much else. Africa, Afghanistan and Iraq all have thriving telecom markets, and everyone has cell phones, and this is one more way to tap into this technology for the good of the company and mission.

     In order to maintain the edge in this market of force, and not lose folks to the enemy or a competitor, you need to make sure every last penny you are spending on these guard contracts is accounted for.  It also makes it very hard for your subcontracted field managers to take from the guards, which will also help in your market of force optimization. Anything you can do to minimize the potential for corruptive activities is a good thing.

     Now on to some ideas with this ‘mobile cash’ concept that the authors could have expanded on.  I have talked before about COIN and SMS, and this kind of cell phone payment system will make it easier to crowd source and spread messages. Some of the ideas I was thinking of is to offer bounties through the same system for any individuals that can locate wanted enemies or provide information. You could also provide bonuses to guards that participate in surveys.  How about an english learning program, which would make it a game for guards to learn english?  There are a ton of things you could ask the guards to do in order to get ‘feedback gold’ before they could collect their paycheck. I guess the point is, is just offering payment through this convenient service will be reward enough for anything you need them to do.

     The other thing that you could do with this concept for government related services, is to constantly ask police, military, and government folks to identify issues that need to be addressed within their organizations–before they collect their paycheck via phone. You don’t want to piss them off by making them go through too many hoops, but you could definitely tap into all of these ‘human sensors’ throughout the organizations, and get a feel for what is going on and collect data.

     I really like the commerce angle on this.  If this mobile cash concept makes transactions more transparent with better record keeping, then that will make banks more accountable. Especially when you have dorks like Karzai’s family in charge of the Kabul Bank, and because they keep playing games and writing checks to all their friends, that now you have a bank in trouble. (and I will pull my hair out if the US bails out this bank…pfffft) Hell, if there was a way to bypass corrupt local banks and maybe use international banks or even try a telecom bank type system?  Who knows, but either way the cell phone transaction will only add more record keeping to the whole thing.

     Now for the future.  I believe in several years, the smart phone market will catch up in these war zones.  People might joke, but locals in the cities will purchase these things because they are status symbols. The car, motorcycle, satellite dish, cellphone, and the soon to become a hit ‘smart phone’ are all status symbols that locals in these countries want to have. These devices will also be within their reach just because there will be such a large supply of them throughout the world.  The telecom industries in these countries will also do their best to keep up with this latest trend.  That is just my thoughts on the future of this stuff.

     Now imagine a local Afghan businessman with basically a computer in his pocket?  The apps, the online payment systems of international banks, the social networking, all of it, will be available to these folks in developing countries. It will be wise for us to take advantage of this new reality, and develop strategic communications plan that utilizes these devices as a means to reach out. Good article and a big hat tip to the guys at Small Wars Journal for putting it out there. –Matt

——————————————————————–

One Cell Phone at a Time: Countering Corruption in Afghanistan

by Dan Rice and Guy Filippelli

September 2, 2010

Download the full article: One Cell Phone at a Time

American commanders are preparing for a major offensive in Afghanistan to attack one of the most formidable enemies we face in country: corruption. Despite sincere efforts to promote governance and accountability initiatives, Afghanistan has slipped from 112th to158th place on Transparency International’s global corruption index. One reason the international community has been unable to effectively tackle corruption in Afghanistan is that our own reconstruction efforts perpetuate the problem. As Secretary of State Hillary Rodham Clinton recently acknowledged, “Corruption, frankly… is not all an Afghan problem.” Money appropriated to secure and stabilize the country is too easily siphoned and redirected as it changes hands, inevitably making its way to local powerbrokers, insurgent networks, and offshore bank accounts, rather than the individuals who need it most. One solution to this problem lies in the palm of our hands: the mighty cell phone.

(more…)

Tuesday, August 3, 2010

PMC 2.0: The Middle East Declares War Against BlackBerry Smart Phones

     The  author of “City of Gold” a history of Dubai, Jim Krane said, “The U.A.E. has never been a place that offered much in the way of electronic privacy. “The government makes no secret that it monitors electronic communication, including text messages, phone calls and e-mail. The revelation that secure BlackBerry data is frustratingly out of the government’s reach only confirms this.” 

*****

     This is definitely some PMC 2.0 news, just because many contractors carry BlackBerry smart phones, and many companies have management teams that depend upon this phone.  So imagine all these guys having to give up those phones just to do business in the middle east?

     One interesting tidbit with all of this is that these countries really don’t have a problem with iPhones, just because they can easily monitor the traffic on those devices. That is good and bad for contractors that have iPhones.  It kind of confirms what the best phone is for privacy–the BlackBerry.  Although there are still ways to make iPhones secure, it’s just with this crackdown on ‘CrackBerry’s’, it seems that the BlackBerry is the winner.

      Below, I posted three articles.  The last one is from 2005, but still a good one on how PIN messaging works for BlackBerry phones. The other articles detail what fears the various middle eastern countries have in regards to the BlackBerry. Interesting stuff. –Matt

—————————————————————–

UAE crackdown on BlackBerry services to extend to foreign visitors

Tuesday, August 3, 2010

DUBAI, UNITED ARAB EMIRATES — The United Arab Emirates’ crackdown on BlackBerry services will extend to foreign visitors, putting the government’s concerns over the smartphones in direct conflict with the country’s ambitions to be a business and tourism haven.

The UAE’s telecommunications regulator said Monday that travelers to the city-state of Dubai and the important oil industry center of Abu Dhabi will — like 500,000 local subscribers — have to do without BlackBerry e-mail, messaging and Web services starting Oct. 11, even when they carry phones issued in other countries. The handsets themselves will still be allowed for phone calls.

UAE authorities say the move is based on security concerns because BlackBerry transmissions are automatically routed to company computers abroad, where it is difficult for local authorities to monitor for illegal activity or abuse.

Critics of the crackdown say it is also a way for the country’s conservative government to further control content it deems politically or morally objectionable.

(more…)

Tuesday, June 29, 2010

Law Enforcement: ‘iPhone On Steroids’ Gives Law Enforcement A Biometric Boost

     “The technology is a game-changer,” McDonald said. “It’s going to enable officers to really get a handle on who the bad guys are, and make it more difficult for these bad guys to hide from us.”

*****

     I really like technologies like this, because they piggy back on already available platforms that everyone is familiar with.  Plus this is just neat.  To be able to use your iPhone to capture electronic fingerprints, iris scans and photographs, and then send them into a massive database to tell if you have a criminal or not, is pretty damn cool.

     This could also have application in the war.  Biometrics were used in cities like Falujah in Iraq, to keep track of everyone coming in and out of check points.  If you can put together a database of everyone’s identity in a population center, and you have iris/photo/finger print identification for each person, you can track people way better. It could also help out a country in determining the status of their population, and truly identifying people who are citizens so they could award them the services they deserve. We should be using these technologies more, if we want to separate the bad guys from the good guys.

     Plus contractors and soldiers have access to iPhones, and many carry them.(I carry one on contracts)  Or these smart phones could be purchased off the shelf for military units, and distributed that way. The phones come equipped with all the computing power and mobile apps available on the internet. Apple makes a great product, and they have fantastic support for that product. Devices like the MORIS just slip over the thing, and give it this capability. That is far better than re-inventing the wheel, and paying for that re-invention to get a product that will probably be less capable than what is currently available. –Matt

——————————————————————

MORIS

‘IPhone on Steroids’ Gives Law Enforcement a Biometric Boost

Jun 25, 2010

By Russell Nichols

Plymouth County, Mass., Sheriff Joseph McDonald calls the county’s latest crime-fighting tool “an iPhone on steroids.”

A fitting description for the device, which he said enhances and strengthens the ability of law enforcement officers to identify suspects and retrieve their criminal records in seconds by capturing biometric data.

“The technology is a game-changer,” McDonald said. “It’s going to enable officers to really get a handle on who the bad guys are, and make it more difficult for these bad guys to hide from us.”

This month, Plymouth County became the first in the country to deploy the Mobile and Wireless Multi-Modal Biometric Offender Recognition and Information System (MORIS). The system is part of a national network, designed to help law enforcement agencies keep track of sex offenders, gang members, inmates and illegal aliens, said Sean Mullin, president of Plymouth-based Biometric Intelligence and Identification Technologies (BI2 Technologies), which developed MORIS in partnership with Apple.

(more…)

Thursday, June 24, 2010

Building Snowmobiles: Human-flesh Search Warfare

     Sinnreich adds a psychological component. “A lot of us really know next to nothing about what’s really going on militarily in Afghanistan,” he says, “so when a schism like this opens up, we think, ‘There must be more to this.’ ” A “collective detection mentality” takes over, he says, and thousands of people start piecing together thousands of bits of information to get a bigger picture.

*****

     If anyone is wondering how I come up with this stuff, I will explain.  I will read about one interesting concept, store it away in my brain, and then when I hit some trip wire ideas that fit in with that prior concept, some ‘illumination’ occurs. In this case, I was reading about human-flesh search engines a week or so ago, and then the Rolling Stone atomic bomb of a story comes out, and I started putting two and two together.

   First, let’s discuss what each component is and then we can discuss how they fit together, and then finish up on how to weaponize the concept (if possible).  Because if you look at what happened here, the best general that the US had, second only to Petraeus, was effectively removed from his post, all because of what was said in an article and the flash fire effects of new media.  That is one hell of an attack if you could figure out how to reproduce it.

   The first part of the concept is the human desire to want to know.  And the tools we have available to us these days, give us the ability to ‘know’ what is going on very quickly.  The news cycle and people’s ability to get that news, and how it allows us to pass it on to the next guy is mind boggling fast.  It doesn’t combust like a fire, it explodes like a bomb, and new media/social media is the facilitator for everyone who wants to know.

   For example, when the McChrystal ‘Runaway General’ news came out, I had heard about it via Facebook, Twitter, newsletters, updates via email, and my RSS reader.  I also got the news via my iPhone, which means I did not have to wait until I got home to read all of this stuff. The news exploded, and like most, I passed that news on to my network.  I then got to work on posting a blog entry about the thing, because it was a big story.  And so did thousands of other journalists, bloggers, forum participants, etc.  So analyzing the whole thing kicked in instantly as well.

   On my RSS reader, I saw multiple blog posts coming up from all over about the story.  People analyzing and giving opinions, and everyone was reading everyone else’s stuff and trying to come up with the best conclusions.  Partly because they wanted to know the real deal, and partly because they wanted to choose the right angle on the whole thing so they would not look like an ass to their readers and friends. So not only did bloggers want to ‘know’, they wanted to be the ones that looked like they ‘knew’.  All of these bloggers, to include myself, were furiously going over the material as it came out over the internet.  Our business is to know, and believe me, we were trying to do that.

   That process of wanting to know, or what the professor up top worded as ‘collective detection mentality’ is the first part to understand here. We are human, we are competitive, and knowledge is power.  When everyone is fighting to learn and know what is going on, that process creates the informational tsunami.  That information wave can also do much to force an action and create a desired outcome for whomever originally intended to create such a thing.  If you look at how President Obama and the upper command reacted to this incident, it is startling.  This didn’t happen over the course of weeks or days.  It happened virtually overnight and a top general has been removed from power.

     The second concept to look at is the idea of human-flesh search engines.  This is a concept out of China that has equally startling results. If a person is made a target by whomever on a forum, and whatever act this target did was sufficient to bring on interest and vengeance, well then you have all the elements of a human-flesh search.  People want to ‘know’ why this target did what they did, they want to ‘know’ who they are, what they are doing, where they live, and most importantly, they want to make sure the target suffers for any wrong doing.

   It is that power of wanting to ‘know’ that fuels the crowd in sort of virtual lynch mob.  A prime example of this was the whole Jax Desmond affair here on the blog and forums.  When it came out that Jax was lying about who he was, this industry reacted to it much like how the Chinese human-flesh search engines turned out.  My readers were at first picking apart the guy’s lies, which was great, but then you could see on the forums that people wanted vengeance.  Folks were posting his address, real name, etc. and doing all they could to get back at Jax.  In their minds, he deserved everything he got, and each person out there was going to contribute to his demise. My point with this is that a crowd with the desire to ‘know’, coupled with the desire for vengeance against an individual they perceive as bad, can be quite impressive to watch and certainly damaging to the intended target. As a result, the Jax Desmond name is mud in this industry, and when the crowd decided they ‘knew’ enough to act, they quickly dispensed their justice.

      Now let’s put them together, and build a snowmobile.  Could you initiate a human-flesh search attack (HSA), that could create a desired result? I think you can, but only with a multi-faceted approach, and persistence. You must identify your target, identify the element that the crowd would like to ‘know’, and really exploit the virtual mob mentality if that target has done something that would be considered immoral. Your HSA strategy should strive to mimic other incidents that showed all the hallmarks what is mentioned in these two articles, and the examples I have provided. Most importantly, persistence is key, because you cannot say for sure if your HSA will work the first time out.  It would take a constant attack from multiple angles, to be successful. It helps to throw the match in the right places though, and that is the key.  The forest fire analogy fits well with conducting HSA.  If you can keep shooting flares into pockets of unburned fuel, from across the canyon, eventually you will get one of the pockets burning and they will start the fire that you wanted to start.

   The other thing about Human-flesh Search Warfare is defending against such a thing.  Yet again, I look at the forest fire fighting analogy for the defense.  You must create fire breaks to defend crucial aspects of your forest.  Or in terms of what we are talking about here, you must protect yourself or your principle by insuring you have the appropriate defenses in place.  Having journalists from Rolling Stone hanging out with you for a couple of weeks is probably not a good idea–no buffer there.  Making wild and false claims online about your company or your personal actions, would also not be a good idea–not much buffer there either.

     But most of all, you need good intelligence that focuses on you and the enemy.  ‘Know yourself, know your enemy’ as Sun Tzu would say.  Because if you know yourself, you will know what weaknesses, immoralities, etc. that the enemy might possibly use against you in this kind of attack.  Knowing your enemy will help you to figure out their intentions towards you or folks like you, and how they like to conduct HSA. You should also stay up to date with technology and ‘knowing’ yourself. Use the same tools and resources that your enemy uses, if you want to really know what he knows. You can also try to copy your enemy’s strategy and tactics, and add one little technological or operational piece to that package to get an edge.  If your information officer, or whomever is assigned to be your virtual body guard cannot do these basic things, then you should look at firing them. Because this is something any good practitioner of strategic communications or new media should be wary of and try to understand, so they know how to best build that fire break or place the match in the right patch of fuel in the forest.

   Well, let me know what you think.  If I am missing something here, or you have something to add to this stew of ideas, I would be interested to hear what you got.(be sure to read both stories below because they are relevant to this post) –Matt

New media too speedy to outflank

China’s Cyberposse

Edit: 6/25/2010- I wanted to add one more human-flesh search warfare case to this, for further thought.  Wikileaks is an excellent example of the power of human-flesh search, and what it could do to the war effort.  Some Army Intel kid leaked the videos anonymously to Wikileaks, and that was all that was necessary to spark the human-flesh search engine. Media was linking to the videos and site, and overnight, war leaders and politicians had to deal with this.  When that came out, it exploded as well.  But if you look at Wikileaks, what was the element about it, that would attract that Army Intel kid to contribute in the first place.  That is why this is such an intriguing idea to talk about.

——————————————————————-

New media too speedy to outflank

By John Timpane

Jun. 24, 2010

It began as a scattering of acid remarks within earshot of a Rolling Stone reporter. But – thanks in large part to Twitter, the Web, and cable news – barely two days after those remarks were disclosed, a media firestorm ended Gen. Stanley A. McChrystal’s tenure as commander of U.S. and NATO Coalition Forces in Afghanistan.

Fast, overwhelming, decisive: It’s a case study in how tightly connected 21st-century media can whip a story into a full-on tsunami, with startling consequences for individual careers and national policy.

“Rolling Stone broke the story, but it was Twitter that got the story rolling,” says Aram Sinnreich, a media professor at Rutgers University in New Brunswick, N.J. “The peer-produced social media are doing to cable-news networks what cable news did to broadcast. We’ve gone from the one-day news cycle to every hour on the hour to second by second.”

Noah Shachtman, a nonresident fellow at the Brookings Institution and a blogger at Wired magazine, says: “The fact so many of us are networked together enabled the information to spread speed-of-light fast. That turned what might have been a slower-burning flame into an instant conflagration.”

(more…)

Monday, June 14, 2010

PMC 2.0: Tip Submit

Filed under: PMC 2.0,Technology — Tags: , , , , , , — Matt @ 5:43 PM

     This is pretty basic and I just wanted to get this one out there as another resource.  This kind of stuff is just another way for a company to connect with it’s contractors, and especially with contractors that really don’t want to reveal who they are.  If someone has information, and they feel frustrated or intimidated by all other means of communication in the company, a ‘tip submit’ option might be another way.  Like I have mentioned before, companies should be using this information to their advantage (feedback gold) to not fire people necessarily, but to shape policies and their organization to better serve the client and fulfill the contract.  This is especially good for companies that have an office in the US and operations in another part of the world.

     I also think this kind of thing would be good for COIN operations in countries where SMS is as technological as a local population can get.  Although I have seen smart phone usage in places like Iraq, the infrastructure to support smart phones, and the cost factor is what limits that.  But even with smart phones you can still text message, as opposed to sending anonymous emails or whatever.

     Governments could benefit as well, and anonymous texting can be just one more tool to use in order to seek feedback.  It is also a way for employees or the public to connect, and not have to worry about anything coming back to them.  It allows ideas and information to dominate the conversation, and takes the person out of that conversation(if they so desire).  Not everyone out there wants to be in the spotlight, or be put on a soapbox–all because they had a good idea, or bad idea, or some crucial tip that led to stopping a crime or wrong doing.

     What this story below really highlighted was the law enforcement application of this.  Software like this only adds to a department’s SMS strategy. It allows law enforcement to connect with people, and it empowers an individual to do something good without fear of reprisal by criminals.  That is a very important element to this, and the safer and easier it is for people to act, the better.

     The only problem now is teaching people how to erase the history on their phones, so criminals or insurgents can’t take that phone and put ‘two and two together’.  That goes back to the SMS strategy and a text message should be sent back to the person on how to erase what they just did. That’s unless this company has already figured out how to do this automatically or something?  Interesting stuff. –Matt

—————————————————————–

Tip Submit

TipSubmit… the industry leading solution for guaranteed secure and anonymous web tips!

Anderson Software… developer of TipSoft, the leading tip management solution, has now released by far the best way for tips (any type of confidential intel) to be accepted thru the web. Discover how much additional intel you could be receiving from those who otherwise shy away from phoning you with information. Our web tips are guaranteed secure and anonymous and are very easy to implement and use!

Website for company here.

——————————————————————

Agents watching Canadian border seek tips via text message

June 9, 2010

METALINE FALLS, Wash. — US Border Patrol agents often use horses to look for smugglers in the forested mountains along the Canadian border, but now will be adding a more modern tool to help them keep watch: text messaging.

The agency yesterday began asking residents, campers, hunters, and other outdoor enthusiasts to send anonymous text messages to report suspicious people they come across in the lightly populated area from Washington to Montana.

“Each alert person is going to be an extra set of eyes and ears for us,’’ said Danielle Suarez, spokeswoman for the agency’s Spokane Sector, referring to the 200 agents who patrol the region.

The agency is also pushing a companion service that allows people to send tips through the website, tipsubmit.com. Officials say the e-mail is necessary in a region where cellphone coverage is sparse.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress